<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>multi-factor authentication &#8211; TELEGRID</title>
	<atom:link href="https://telegrid.com/tag/multi-factor-authentication/feed" rel="self" type="application/rss+xml" />
	<link>https://telegrid.com</link>
	<description></description>
	<lastBuildDate>Mon, 10 Aug 2020 17:49:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.6.13</generator>

<image>
	<url>https://telegrid.com/wp-content/uploads/2022/09/cropped-Screen-Shot-2022-08-29-at-9.50.37-AM-32x32.png</url>
	<title>multi-factor authentication &#8211; TELEGRID</title>
	<link>https://telegrid.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Why is Cybersecurity So Slow?</title>
		<link>https://telegrid.com/why-is-cybersecurity-so-slow?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-is-cybersecurity-so-slow</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Fri, 19 Aug 2016 14:16:09 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[identity and access management]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[network performance]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=536</guid>

					<description><![CDATA[<p>Do cybersecurity vendors consider user experience?  We need to start designing solutions based on both network protection AND network performance.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/why-is-cybersecurity-so-slow">Why is Cybersecurity So Slow?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Two weeks ago I attended a US Military tradeshow that showcased the latest and greatest cybersecurity technologies.  As I sat and listened to the presenters the same question kept popping into my head.   It is a question that has bothered me for some time and no vendor has been able to answer appropriately.  I hit my breaking point when I heard a presenter discuss his company’s ability to put every packet in its own tunnel as part of something they call the Romulan cloaking technique (example of a bad analogy).  So, after the presenter finished I raised my hand and asked my question, looking for King Arthur to extract the proverbial Excalibur from my brain (example of a good analogy).</p>
<p><span style="color: #ff6600;"><strong>“WHAT ABOUT LATENCY?”</strong></span></p>
<p>Three simple but powerful words that show where cybersecurity has started to go wrong.  How can you put every packet in its own tunnel without massively affecting network performance?  Does user experience even matter anymore?</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Is it just me or are new cybersecurity products just rehashes of old cybersecurity products?  We have gone from 128 bit encryption to 256 bit encryption.  We have gone from endpoint protection to advanced endpoint encryption.  We have gone from firewalls to next generation firewalls.  We have gone from deep packet inspection to deeper packet inspection to deepest packet inspection.  It is the same thing Hollywood did when they remade the greatest films of our generation like Ghostbusters and Vacation.</p>
<p>Do vendors stop and think about the effect they are having on network performance?  Indeed a Cisco survey found that <u>71% of Chief Executives think that cybersecurity slows down the pace of commerce</u>.  So how are vendors improving cybersecurity without affecting latency?  The answer seems to be more blade servers, faster processors, and ASICs.  This may work but it also translates into higher costs for the customer.  Are cybersecurity vendors starting to price themselves out of the market?</p>
<p>We need to rethink cybersecurity.  We need to start designing solutions based on both network protection AND network performance.  We need to look at our network from a holistic standpoint and identify existing tools that we can use for cybersecurity.  Let’s call it Cybersecurity 3.0!  (I know we skipped 2.0 but I was at a social media talk last week and the speaker used the term Web 3.0 so cybersecurity needs to catch up.)</p>
<p>In the next few weeks TELEGRID will be launching the first Cybersecurity 3.0 product which promises to turn the field of authentication on its head.  If you are not on it already then<strong> <span style="color: #ff6600;"><a style="color: #ff6600;" href="http://telegrid.com/join-mailing-list/">Join Our Mailing List</a> </span></strong>so you do not miss the release.  In the meantime if you are looking for a secure authentication tool give me a call at 973-994-4440 and I will give you a sneak peek.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/why-is-cybersecurity-so-slow">Why is Cybersecurity So Slow?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is Your Password Worth $10?</title>
		<link>https://telegrid.com/is-your-password-worth-10?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=is-your-password-worth-10</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Fri, 10 Jun 2016 17:27:30 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[identity and access management]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[password management]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=502</guid>

					<description><![CDATA[<p>Every day there are new headlines about stolen passwords.  Multi-Factor Authentication is the only true prevention but how do we MFA-enable applications and devices that are not MFA-capable today.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/is-your-password-worth-10">Is Your Password Worth $10?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I heard about a million dollar website idea (that you <strong>SHOULD NOT DO</strong> because you will go to prison).  The idea is to create a website called www.freetendollars.com (I checked and the name is still available).  The website asks users to create an account with an email and password and in turn they will receive ten dollars in the mail.  That’s it.</p>
<p>So how do you make a million dollars?  Simple, you take that email and password and use it to break into the victim’s bank account and steal their money.  If you do not have enough information you wait until they try to relog in to www.freetendollars.com, perhaps to find out where their ten dollars is, and whatever password they try tell them it is wrong.  Then just wait as they try every iteration of password they can remember.  When that is done prompt them for security questions that they never answered but probably forgot about.  Before you know it you will have their bank account password, home security alarm code, first dog’s name, and street they grew up on.  The beauty is that you never even sent them ten dollars!</p>
<p>How often will this work?  Roughly 60% of the time based on <a href="http://www.inc.com/will-yakowicz/infographic-95-percent-share-6-passwords-with-friends.html">studies</a> showing the number of people who reuse passwords on multiple sites.  It is not just current passwords that are an issue but even old passwords can come back to haunt us.  Just ask <a href="http://techcrunch.com/2016/06/06/zuckerbergs-twitter-pinterest-linkedin-accounts-hacked/">Mark Zuckerberg</a> whose LinkedIn password from 2012 recently allowed hackers to access his current Twitter and Pintrest accounts.  The truth is that even when we change our passwords we usually only change one number or character.  <a href="https://www.ftc.gov/news-events/blogs/techftc/2016/03/time-rethink-mandatory-password-changes">A study by UNC</a> found that “for 17% of the accounts they studied, knowing a user’s previous password allowed them to guess their next password in fewer than 5 guesses.”</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>To combat password risk, industry has made an effort to consolidate the number of places where your password is kept.  Single Sign On technologies, based on protocols like SAML and OAuth, have spread rapidly including the ubiquitous “Connect with Facebook” button.  While this does reduce the number of attack vectors it doesn’t solve the problem.  We have also seen a move to Public Key Infrastructure (PKI) with some truly amazing technologies like storing public keys in the <a href="https://onename.com/">Bitcoin blockchain</a>.  But the basic problem still remains that relying on only one form of identification is risky especially when your private key is stored in a smartcard, phone, or other object your 4 year old can put in the toilet.</p>
<p>The best solution is Multi Factor Authentication (MFA).  MFA consists of something you know (e.g., password, pin), something you have (e.g., smartcard, phone) and something you are (e.g., fingerprint).  By providing 2 out of the 3 factors users are securely authenticated.  While there are logistical issues with moving to MFA I believe they have more to do with the infrastructure than with users.  One good example is the delay given to <a href="http://money.com/4040808/credit-card-chip-fraud-emv/">gas stations</a> to install hardware for chip and pin credit card readers.  For software applications it should be simpler but there is still the cost of software redesigns.</p>
<p>What we really need is technology that MFA enables applications and devices that are not MFA capable today.  This is currently available in the TELEGRID-developed <a href="http://telegrid.com/authentication-authorization/">SMRTe</a>, a Unified Authentication and Authorization Manager that sits in front of applications and devices and enables MFA.  With the <a href="http://telegrid.com/authentication-authorization/">SMRTe</a> we can securely authenticate users with MFA without the logistical headache of rewriting code.</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/is-your-password-worth-10">Is Your Password Worth $10?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
