The past few years have seen an ever-increasing avalanche of high-profile and high-impact data breaches.

There are, of course, myriad different ways for bad players to access someone’s account nefariously but one of the more popular ways is via password infiltration — the genesis of a stolen password is somewhat irrelevant, since once the password falls into the wrong hands, access is absolute.

Which is why there is a move towards alternative or additional methods of authentication. In particular, two-factor authentication (2FA) has gained much attention in recent times. But while 2FA is effective, it is also, to be honest, a bit of a pain for users. Anything that increases the stress of users trying to log into services creates another barrier to increased security.

To read this article in full or to leave a comment, please click here

Ben Kepes

Ben Kepes is a technology evangelist, an investor, a commentator and a business adviser. Ben covers the convergence of technology, mobile, ubiquity and agility, all enabled by the Cloud. His areas of interest extend to enterprise software, software integration, financial/accounting software, platforms and infrastructure as well as articulating technology simply for everyday users.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.