Resource Centre > Research Gateway > Secure Computing > Best Practices for Authenticating Mobile Workers and Securing Data Access

Best Practices for Authenticating Mobile Workers and Securing Data Access

Secure Computing

In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.

Email this page
Published:  Jan 25, 2008
Length:  4
Type:  White Paper
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam