Presentation is loading. Please wait.

Presentation is loading. Please wait.

System Access Authentication

Similar presentations


Presentation on theme: "System Access Authentication"— Presentation transcript:

1 System Access Authentication
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC Consulting Network Security IT Audit Education

2 Cybersecurity in 2017 Transactions Is more or less money being access digitally today than previously? More attacks against your physical organization or against your digital organization? What are the three things are “bad guys” after? Cybercrime = Organized Crime More breaches More threats MORE RISK! © SBS CyberSecurity, LLC Consulting Network Security IT Audit Education

3 What Are YOU to Do? Protect your passwords and do not share them.
Do not use the same password for work and personal. Change your passwords regularly. Be cautious about free Wi-Fi. Learn to recognize phishing s. Be aware of potential fraud situations. Understand, anything you text or post online will never go away. Use multifactor authentication to access systems. © SBS CyberSecurity, LLC Consulting Network Security IT Audit Education

4 What is Multifactor Authentication?
There are three main factors of authentication. Knowledge Factors - Something you know Possession Factors - Something you have Inherence Factors - Something you are Financial Institutions are required by regulations to provide multifactor authentication for access to non public customer information. © SBS CyberSecurity, LLC Consulting Network Security IT Audit Education

5 What is Multifactor Authentication?
What works as a factor of authentication? Something you know – This is the most common factor and is easier to compromise. These are access credentials like user names, passwords, personal identification number (PIN), or security questions. Something you have – Hardware token or a One-time passcode. A less secure item is a hardware cookie on your device. The hardware cookie may easily be compromise. Something you are – Fingerprints, hand geometry, retinal or iris scans, handwriting, and voice analysis. © SBS CyberSecurity, LLC Consulting Network Security IT Audit Education

6 What is Multifactor Authentication?
There are less common factors sometimes used. Location Factor – Identifies the location you are gaining access from and initiates a computer call back to validate the remote user. May also be a GPS tracked device allowed to access the system based on the location of an approved device. Time Factor – Uses an intelligence configuration to identify a combination of access times from two extended locations too far apart to be legitimate and may cause the access to be suspicious and block the access. The location factor is mainly used for remote access applications. The receiving access devices will have an approved location list configured. © SBS CyberSecurity, LLC Consulting Network Security IT Audit Education

7 Something You Know Factor
Sometimes this may feel like your password requirement? © SBS CyberSecurity, LLC Consulting Network Security IT Audit Education

8 Something You Know Factor
We are all consumers and we like convenience! User names should not be easily determined. Passwords should be at least 8 characters (15, if possible) with 3 of the 4 characteristics of upper case letter, lower case letter, number, or symbol. Do not use a dictionary word. Do not set your internet browser to remember passwords. Passwords should be replaced at least every 90 days. Should not use a repeated password for at least 12 months. Security questions should be out of wallet and not preselected standard questions. © SBS CyberSecurity, LLC Consulting Network Security IT Audit Education

9 How Do You Keep Up With Access Credentials?
Do not write your access credentials down and keep them on your desk, on your computer, under your keyboard, or under your desk calendar. Access credentials should be kept in a safe location and no one else should have access to your credentials. Is writing them down and locking them in your desk ok? Is a spreadsheet password protected ok to have? How about using an application to manage your access credentials ? © SBS CyberSecurity, LLC Consulting Network Security IT Audit Education

10 Passwords are like bubblegum
Strongest when fresh Should be used by an individual, not a group If left laying around, will create a sticky mess © SBS CyberSecurity, LLC Consulting Network Security IT Audit Education

11 Something You Have Factor
Something you have is the second most common factor used for authentication. This factor added to something you know will give you the multifactor authentication you need to have improved secure access. © SBS CyberSecurity, LLC Consulting Network Security IT Audit Education

12 Use Multifactor Authentication
Using at least two factors of authentication dramatically increases your access security! Many systems allow you to use a second authentication factor, what you have, by implementing the one-time passcode. Use it if available. © SBS CyberSecurity, LLC Consulting Network Security IT Audit Education

13 Presented by SBS CyberSecurity
(605) Let’s Connect! 700 S Washington Ave Ste 200, Madison, SD 57042 © SBS CyberSecurity, LLC Consulting Network Security IT Audit Education


Download ppt "System Access Authentication"

Similar presentations


Ads by Google