Hackers, Mobile Technology and Social Media Sites and Multi Factor Authentication
Computers & Technology → Internet
- Author Adam Quart
- Published May 5, 2012
- Word count 463
Many organizations are responding to the increased popularity of mobile devices and social media with increases in security staffing. Security professionals are most concerned about targeted attacks, external hackers and insider threats. Mobile computing, social media and internet technologies make the security professional’s jobs much more challenging.
According to reports, nearly 50 percent of IT security professionals say that external threats pose moderate to significant risks to their organizations, compared to 46 percent for accidental breaches by insiders and 44 percent for malicious insiders, according to the survey conducted by Symantec called the 2011 state of security survey, released August 31. Many organizations rank cyber attacks as bigger risks to their businesses than other forms of criminal activity or natural disasters.
Mobile computing, social media and internet technologies were the top trends in the industry making enterprise security more challenging. Many organizations also think that securing platforms and data was significantly more important than it was 12 months ago. According to the report, 29 percent of organizations see attacks on a regular basis and 71 percent had been attacked at least once in the previous 12 months. The top kinds of attacks were malicious code, social engineering and other external attacks.
About 46 percent of businesses reported increasing networking and web security staff, 41 percent of businesses planned to increase the budget for security and 38 percent of businesses plan to increase their budget for security systems management. As organizations are increasing their security to improve protection, the treats will continue to evolve and continue.
Businesses can protect themselves from these type threats by integrating multi factor authentication solutions to help combat these attacks. Multi-factor authentication is a security system in which more than one form of authentication is implemented to verify the legitimacy of a transaction. In contrast, single factor authentication involves only a user ID and password. In solutions that use two factor authentications, the user provides dual means of identification, one of which is something like a physical token, such as a card, and the other of which is typically something memorized, such as a security code.
As more organizations use mobile technologies and social media on these mobile devices, the threats will continue and solutions such as multi factor authentications will be the key to reducing these security threats. Additional authentication methods that can be used in MFA include biometric verification such as finger scanning, iris recognition, facial recognition and voice ID. Smart cards and other electronic devices can be used along with the traditional ID and password.
When discussing security, layers are always necessary. Multi factor authentication is a great solution to prevent intruders, but other measures need to be taken against malicious code. All systems need to be protected against various types of penetration. Organizations will still need firewalls, intrusion prevention systems and other types of security measures.
Adam Quart is a internet security specialist who believes multi factor authentication provides remote access security for businesses and privacy for consumers.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- What is CCTLD?
- Gulf Website Hub Reveals Fresh Digital Solutions to Enhance Dubai's Expanding Market.
- Embrace Multi Graphics Inc. Expands Services to Meet Growing Demand in Digital Marketing, Design, and Printing
- Website Development Trends in 2025
- Viewing Instagram Stories Without an Account: Imginn Viewer Insights
- How to Find, Use, and Manage BitLocker Recovery Keys on Windows 10/11
- Building a Professional Website on a Budget: Using Free Tools like WordPress and AI
- Ava Labs CEO On Why You Shouldn't Ignore Red Flags In The Industry
- Cyberbullying: Empowering Families to Safeguard Their Kids
- 10 Common Online Scams to Avoid: Protecting Your Identity and Finances
- Spring Break and Staying Secure Online: An Internet Safety Guide for College Students
- Unveiling the Future: The 10 Revolutionary Trends Shaping Small E-Commerce Businesses in 2024
- Unlocking Online Content with YouTube Video Downloaders
- Unleashing the Potential of Online Earning: A Comprehensive Guide
- Navigating Success in the Digital Realm: Unveiling the Power of Digital Marketing
- How AI Will Affect the Future of Search
- Maximizing Business Efficiency: The Strategic Role of Business Intelligence with DataInseyets
- Cyber Resilience in the Age of AI
- Harnessing the Power of AI & Blockchain for Data Security and Transparency
- AI Ignites 6G Advancements in Wireless Technology
- How AI is Revolutionizing Content Writing
- What You Need to Know About Writing Prompts
- The Remarkable Ways to Use the AI-Powered Chatbot
- Where Will AI Take Us in 2024?
- AI Written Content Creation Trends for 2024
- Will AI-Linked Cryptocurrency Sector Thrive in 2024?
- Is AI Regulation vs AI Deregulation a Real Concern?
- Prompt Engineering: A Beginner's Guide to Prompt Engineering
- Balancing Innovation and Regulation of AI in the Future
- Crafting AI Short-Form Content: The Future of Digital Marketing