Page 1 of 1

According to statistics, weak or stolen passwords

Posted: Tue Feb 11, 2025 5:11 am
by Rakhirandiseo
Qere used in more than 80% of information security incidents. In this regard, the implementation of two-factor authentication significantly increases the level of overall security of the company's resources, allows to reduce the risk of theft or password selection to almost zero, and also to guarantee that communication occurs with a real user. The implementation of the PKI infrastructure allows to completely get rid of passwords. Such authentication works as follows: the user requests a certain service, presenting a public key certificate and entering a PIN code to provide a private key, to implement cryptographic transformations, after their verification, successful access or denial of service occurs. Losing the token is not scary, it is also protected from attempts to select the PIN code, after several unsuccessful attempts it will simply be blocked. And you can even get a certificate for a new key carrier remotely, using a special complex JaCarta Management System (JMS).

From the user interface point of view, this scheme is even simpler than entering a login and password, because a complex password no longer needs to be remembered, the password does not need to be changed every 90 days. In general, frequent password changes are no longer included in the "best practices", and yet are still widely used. There is no longer a need to stick stickers under the keyboard or monitor screen in violation of all sorts of security policies. The user will just need to come up with a not very complex PIN code and use it for access along with a token or smart card.

PARTNERSHIP MATERIAL

“Technologies and tools for remote work are not at all czech republic whatsapp data for companies operating in Russia,” says Elman Beibutov, a representative for the promotion of IBM Security software in Russia and the CIS. “The problem and challenge lies in promptly providing employees with the necessary stack of remote work technologies that replace and complement the usual office mode during the mass transition to remote work.”

In a rapidly changing external environment, he recommends giving preference to cloud technologies, which have a number of undeniable advantages: promptness of receiving services, a subscription payment model for the volume of services received, the fastest possible scaling up and down, no need for in-house IT competencies to maintain services. However, from the standpoint of ensuring information security, he warns, the cloud option requires the development of additional risks - ensuring the security of client data, access to it, guarantees of its deletion after the termination of the use of services, checking the compliance of services with regulatory requirements.