HIT Consultant Insightful coverage of healthcare innovation
> Secure Computing > Best Practices for Authenticating Mobile Workers and Securing Data Access
 

Best Practices for Authenticating Mobile Workers and Securing Data Access

White Paper Published By: Secure Computing
Secure Computing
Published:  Jan 25, 2008
Type:  White Paper
Length:  4 pages

In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.



Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access