Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Blog Feed Post

Two Factor Failure: With complexity comes new vulnerabilities

One of the most significant capabilities in the enterprise defensive arsenal is multi-factor authentication. There is no such thing as a single silver bullet that will mitigate all risks, but in today's world if you do not have multi factor authentication in place you are almost negligent in your defense. Multi-factor defense helps solve many weaknesses of password authentication.

Now the bad news: These systems can be complicated, and with complexity comes new, unexpected vulnerabilities. Many two factor authentication systems have very glaring vulnerabilities.

This point is best shown vice described. See the video at this link and embedded below:

The point of the video is not just to see weakness, but to learn best practices. Please share this with the members of your team working on your two factor authentication programs, they will appreciate knowing this.


Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com