Innovative Identity Management Protects Modern Assets
- Authentication is often key to protecting modern assets, regardless of the type of attack.
- It is important to make your attack surface as small as possible—that is, to take a close look at what you have in place and disable what you don’t need.
“Some companies are using a voice recognition system, where they’ll ask you to say a different phrase aloud each time you call as a form of authentication.”
Cassio Goldschmidt believes that identity management is a crucial factor that must not be overlooked when protecting modern assets. Whether an organization is facing a phishing attack, a brute force attack, or a website breach, insecure passwords often make the exploit more likely to succeed. “Mobile devices, phones, and other types of devices require multifactor authentication. Internet assets also require some type of authentication. People always think about these kinds of things using passwords but, truth be told, passwords are in the process of being phased out,” explains the vice president, cyber resilience practice, at Stroz Friedberg, a risk-management firm.