dcsimg

5 Ways to Ensure Secure Executive Communication

  • 5 Ways to Ensure Secure Executive Communication-

    Embrace Two-Factor Authentication

    Two-factor authentication adds an extra step to your basic log-in procedure, providing yet another layer of security around executive communication. When you have to enter only your username and one password, that's considered a single-factor authentication. Two-factor authentication requires the user to have two out of three types of credentials before being able to access an account. The three types are:

    • Something you know, such as a PIN, password or pattern
    • Something you have, such as a cell phone or fob
    • Something you are, such as a biometric like a fingerprint or voice print

    While it adds an extra step to your login process, two-factor authentication gets a bad rap for being difficult to use. However, the more technology improves, the quicker and easier two-factor authentication can be implemented. Many vendors take as little as two seconds to transfer the needed verification code.

1 | 2 | 3 | 4 | 5 | 6 | 7

5 Ways to Ensure Secure Executive Communication

  • 1 | 2 | 3 | 4 | 5 | 6 | 7
  • 5 Ways to Ensure Secure Executive Communication-3

    Embrace Two-Factor Authentication

    Two-factor authentication adds an extra step to your basic log-in procedure, providing yet another layer of security around executive communication. When you have to enter only your username and one password, that's considered a single-factor authentication. Two-factor authentication requires the user to have two out of three types of credentials before being able to access an account. The three types are:

    • Something you know, such as a PIN, password or pattern
    • Something you have, such as a cell phone or fob
    • Something you are, such as a biometric like a fingerprint or voice print

    While it adds an extra step to your login process, two-factor authentication gets a bad rap for being difficult to use. However, the more technology improves, the quicker and easier two-factor authentication can be implemented. Many vendors take as little as two seconds to transfer the needed verification code.

As you work to create a strong information security posture for your organization, it is important to consider the security framework surrounding executive communication with each other, the board of directors and even third-party partners. Executives frequently need to review and communicate about sensitive information while on the go and outside your network. As more mobile communication options become available, organizations must take precautions to secure the mobile apps and data executives are using.

In this slideshow, Diligent Corporation, a provider in secure collaboration tools for executive teams, shares five steps you can take today to tighten security around executive communication.