![]() ![]() Many login portals simply ask for a username and password (AKA your airline ticket), MFA requires the user to present a secondary piece of information to prove their identity and gain access to the account. match is confirmed, you’re free to continue the boarding process and enter the facility. The agent politely asks to see some identification, comparing it to the information displayed on your ticket. But before crossing the barrier and dashing to your gate, you are suddenly halted by one of the airport’s agents. ![]() Ticket in hand, you finally make it to the front of the line. Imagine, for a moment, that you’re patiently waiting in the TSA line at your local airport. While this article isn’t going to delve too deep into the defining characteristics of MFA, the aforementioned article does a good job of summing up the core concept of MFA through the use of a simple analogy. In Rocket IT’s previous account security series, the topic of multi-factor authentication (MFA) was front and center presenting users with both a quick and highly effective method to protect their online assets. ![]() Data breaches are no new area of discussion, but with the recent flood of incidents and the increased sophistication of cybercriminal attacks, what was once precautionary security measures have now become a necessity.
0 Comments
Leave a Reply. |