How can online fraud be prevented? How can online services be offered in a secure and convenient way? How can the online identities of staff be managed securely? How to prevent phishing attacks? How to manage credentials? What about lost passwords? Is your online banking authentication safe?
If you have any of the above questions, it's time to replace insecure static passwords with highly secure and strong authentication solutions, which provide secure one-time-passwords, thus eliminating any unauthorized access of resources.
BTS partners with one of the major vendors for a strong two - factor authentication solution, to ensure all your critical assets are protected, and only legitimate users access the data which is made available to them.
Two-factor authentication requires using two different methods, or factors, to provide an additional layer of protection. Typically, two-factor authentication involves using either 'what you have' or 'who you are' in addition to the standard username and password ('what you know'). Below are some quick examples:
What you have. This method usually relies on a smartcard, USB thumb drive, or some other type of object which the user must have in order to authenticate. Smartcards and USB drives must be physically inserted into the computer in order to authenticate. There are also encryption tokens which display randomly changing pin codes that the user must enter in order to authenticate. In either event, an attacker would have to know your password ('what you know'), and also be in physical possession of your token or smartcard ('what you have') in order to authenticate as you.
Who you are. Who you are is difficult to impersonate. A rudimentary form of 'who you are' authentication is a photo ID. Providing an official ID which can be verified as being yours by virtue of your photo being on it meets both 'what you have' and 'who you are' criteria. However, a photo ID isn't very functional when dealing with computer access. Biometrics are a common form of 'who you are' authentication. Many characteristics are unique to each individual such as fingerprints, retina patterns, handwriting style, voice pattern, etc. An attacker may be able to guess or crack your password, but impersonating your fingerprint or retina pattern is virtually impossible.