Scalability Blog

Scaling tips, insights, updates, culture, and more from our Server Experts.
 

Protect Big Data With Two Factor Authentication

big-data-blog-header
Big data security is everyone’s responsibility.  Using weak passwords or entering your password from compromised workstations can undermine your organization’s entire infrastructure.  Even on a workstation free of trojans, viruses, and software based keyloggers, there is still a threat from hardware keyloggers.
Hardware based keyloggers for USB and PS/2 devices, such as keyboards and mice, are very affordable and easy to conceal. For $40-$60 anyone can buy a hardware keylogger and introduce it …

Comments Off on Protect Big Data With Two Factor Authentication