Authentication

3-Hat Information Security > Authentication

Good methods for increasing password security. Passwords are critical components of both offline and online security. The usefulness of passwords has seen password-based authentication implemented in almost every aspect of computer operation. As such, it is paramount to understand to make strong memorable passwords. In this article we will be discussing password complexity, password length, password storage, passphrase usage, password...

Read More

Redundant methods for user validation. Definition             Multi-Factor Authentication refers to any supplemental methods of user validation by which the user is required to provide additional information to substantiate their claims of authenticity. This is separate from backup authentication, such as password and username recovery services. The Good Reasons To Implement Multi-Factor Authentication             There are many reasonable arguments...

Read More

Password Managers or better yet, PassPhrase Managers Password management has nearly become a requirement for the effective use of online services. With almost all online services requiring a distinct username and password for registration, there is often the temptation to reuse usernames and passwords. Luckily there are tools which can help you remember or even generate unique passwords to help you manage...

Read More