Digital transformation had brought many impacts to the world we are living today. One of the impact is massive utilisation of internet applications in various daily activities and adoption of IT system in organisations. Until today, password authentication remains as the most implemented authentication method for data security and protection in most applications. Recently, as
Among the years, dark web monitoring and how you can monitor it in particular for your own enterprise exposed credentials is one of the key topics. For any digital breach attempt, you can not prevent it. Your enterprise system is as strong as your user ID and password. But if it already exposed credentials, then
2FA Continue to be cost effective and viable for identity protection, as you read the recent news where Google issued a 10k physical USB authentication key for high risk people who use their services. It is also better than doing nothing, as most of the users will prefer to recycle and use the same password
- 1
- 2