Wednesday 29 July 2009

Influenza A H1N1 and strong authentication?




What is the relationship between influenza and strong authentication? – “Remote Working”

Or in techie speak - translates to the implementation of a remote access solution! If you are following or looking at government or business forums they recommend the use of implementing a number of measures. So what????

One of the measures that are being described is the implementation of remote working solutions to enable working from home.

In all cases no one is highlighting the possible risks to remote access systems by way of gaining access with weak username and passwords? So here's a clarification. Today there are a lot of remote access technologies. As SSL VPN, IPSEC VPN, Citrix, etc ...

But we have a big problem business have and should use Two Factor Authentication. But you say I can just use a username and static password? Technically yes!

But do you think this is a good idea. The risks are far too GREAT. It is so easy to steal or guess someone’s password. Please refer to a number of my blog postings on stealing passwords

The answer is very simple use Two Factor Authentication.

I think the next time the implementation of remote access is under taken business should think twice or consider MAS ICE by CRYPTOCard.

What is the bigger risk to you business H1N1 or an invisible person on your network stealing all of your IP??

Tuesday 28 July 2009

Sexy Technology

Some information that I thought you might find useful..

Please see the following article:-
http://searchsecurity.techtarget.co.uk/news/article/0,289142,sid180_gci1362723,00.html?track=NL-988&ad=717543&asrc=EM_NLT_8797460&uid=8792533

Even Twitter has issues with passwords – which I am sure we will see them address very soon – so customers are not alone:- "It's easy to be seduced by sexy technology, but if your password is compromised, then your security is blown."

The article highlights the need for two factor authentication and also puts forward a really good sales tactic:- "Smart CISOs could use a move to cloud computing as a good reason to ask for budget to introduce two-factor authentication."

Shame he did not mention that the ideal solution is cloud based authentication – never mind
 
Copyright 2009 Jason Hart. Powered by Blogger Blogger Templates create by Deluxe Templates. WP by Masterplan