MEDIUMVulnerability
Global
Two-Factor Authentication Breaks Free from the Desktop
·Source: Dark Reading
Updated:
Executive Summary
Threat actors know how to bypass security systems outside of traditional IT environments. Implementing 2FA could provide a needed extra security barrier in the physical world.
Analysis
Threat actors know how to bypass security systems outside of traditional IT environments. Implementing 2FA could provide a needed extra security barrier in the physical world.