Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

While passwords are still the primary form of user authentication used to grant access to a company’s information systems, multi-factor authentication methods are being introduced, such as tokens. To ensure the proper usage of both, the following must be considered:

  • Passwords must be carefully created and used.
  • Tokens, hard or soft, must be handled carefully, with proper processes in place for replacements.
  • Other multi-factor authentication methods, such as oob sms or email options, must be treated similarly.

Risks Addressed by Policy:

  • Digital assets will be unsecure.
  • Customer data can be easily hacked.

Also In

Use Multi-Factor Authentication to Save Costs and Secure Users

There are no barriers to implementing MFA, no matter what your requirements are.

Related Content


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.