A reliance on passwords to prevent attackers from accessing systems, devices, and applications is outdated and ineffective. Attackers typically count on users implementing password-based security protocols, which opens the door to attacks — such as Trojan viruses, phishing, and man-in-the-middle — that take advantage of vulnerabilities. Attackers have evolved from simply wanting to achieve notoriety to becoming sophisticated thieves who steal personally identifiable information (PII) — such as financial and health care records and account numbers — to targeting the rapidly developing Internet of Things (IoT) market, where a hack becomes more personal and potentially life-threatening.
In this slideshow, Phil Montgomery, chief product officer at Identiv, will provide five recommendations to mitigate risk and maintain a strong security posture in this ever-growing connected world.
An eWEEK Property
Copyright 2020 TechnologyAdvice All Rights Reserved.
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.