September 2015 / OUCH! Security Newsletter

posted Sep 2, 2015, 11:38 AM by Shawn Kohrman   [ updated Oct 2, 2015, 8:30 AM ]
The process of proving who you are (called authentication is key to protecting your information. Strong authentication attempts to ensure only you can access your information: such as your email, your photos or your bank accounts.  There are three different ways to confirm who you are what you know (such as a password), what you have such as your driver’s license) and what you are (such) as your fingerprint. Each one of these methods has advantages and disadvantages. The most common method is passwords, which are something you know. In this newsletter, we are going to teach you how to protect yourself with two-step verification, something far more secure than just passwords and yet very simple to use. To better understand two-step verification, we need to start with passwords first.
Ċ
Shawn Kohrman,
Sep 2, 2015, 11:38 AM
Comments