Networkless working: The future of the public sector?
by Robert Campbell - Managing Director at Ecommnet - Monday, 3 September 2012.
While this might all sound extremely complex, fundamentally networkless connectively is far more flexible, with the underlying infrastructure easier to build and manage.

Secure authentication

Historically, many access gateways required an individual to enter their username and password combination to authenticate themselves. While this may have been adequate for one organisation functioning from one location, as soon as you start co-locating, or even allowing remote access, single factor authentication is woefully inadequate and easily circumvented.

For this reason the introduction of two factor authentication (2FA) is increasingly being driven by legislation and/or the need to be more secure. 2FA fundamentally is the combination of two of three elements:

1. Something you know a username or password, etc.

2. Something you have an authentication device such as a smartcard, etc.

3. Something you are referred to as biometrics it involves retina or fingerprint scanners etc.

Just so were all straight, a username and password combination is not 2FA as it is two variations of one element i.e. two things you know.

Now that weve established what 2FA is, its time to look at what the options are. Fundamentally there are two main forms of authentication device:

1. A physical token or smartcard

2. A virtual token a mobile phone used to receive a passcode via SMS message or generate the code via an app.

Networkless connectivity combined with strong 2FA allows straightforward user access, without constraints, to deliver a completely dynamic set up at the time of connection. So, whether youre merging, re-merging, de-merging or just looking to introduce a more flexible working practice, securely, make sure its future proof and cost-effective. Instead of getting physical, its time to start thinking outside the box, and even the building.

Spotlight

Over 225,000 Apple accounts compromised via iOS malware

Researchers from Palo Alto Networks and WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in all, some 225,000 valid Apple accounts have been compromised.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Sep 1st
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //