> Secure Computing > Best Practices for Authenticating Mobile Workers and Securing Data Access

Best Practices for Authenticating Mobile Workers and Securing Data Access

Published By: Secure Computing
Secure Computing
Published:  Jan 25, 2008
Length:  4 pages

In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.



Tagscell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access