Especially sensitive data may call for “two-factor authentication,” requiring a person to submit two forms of proof that they have permission to look at the data. This might be a password coupled with biometric information such as the user’s fingerprint.
Matteo displays a different security device used in two-factor authentication: A plastic token about the size of a house key. The device, from EMC Corp. subsidiary RSA, contains a liquid crystal display which shows a code number. The number changes every 60 seconds according to a mathematical pattern. To gain access to sensitive information, a computer user might key in their personal password as well as the number from the SecurID device.
Employ Basic Security Techniques: Businesses need appropriate electronics, such as a firewall or a universal threat management device, to make it harder for hackers to get in, said Luce.
“Next generation firewalls that are application aware are a great tool for businesses of all sizes,” Matteo said. These might uncover software that a computer owner was previously unaware of its presence.
For the full story visit: http://www.sdbj.com/news/2012/jun/25/down-dark-alleys-data/?page=2