<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=162429800880729&amp;ev=PageView&amp;noscript=1">

The Tech Break

SD Business Journal: Down the Dark Alleys of Data

Jun 25, 2012 / by Joseph Javien

Especially sensitive data may call for “two-factor authentication,” requiring a person to submit two forms of proof that they have permission to look at the data. This might be a password coupled with biometric information such as the user’s fingerprint.

Matteo displays a different security device used in two-factor authentication: A plastic token about the size of a house key. The device, from EMC Corp. subsidiary RSA, contains a liquid crystal display which shows a code number. The number changes every 60 seconds according to a mathematical pattern. To gain access to sensitive information, a computer user might key in their personal password as well as the number from the SecurID device.

Employ Basic Security Techniques: Businesses need appropriate electronics, such as a firewall or a universal threat management device, to make it harder for hackers to get in, said Luce.

“Next generation firewalls that are application aware are a great tool for businesses of all sizes,” Matteo said. These might uncover software that a computer owner was previously unaware of its presence.

For the full story visit: http://www.sdbj.com/news/2012/jun/25/down-dark-alleys-data/?page=2

Topics: In The News, Jim Matteo, Security

Joseph Javien

Written by Joseph Javien

Recent Posts