Blog authentication

Access Management: an introduction
Identity and Access Management, or IAM for short, is one of the cornerstones of Information Security. Organisations cannot protect the confidentiality, itegrity and availability of information entrusted to them if it can be seen, altered and deleted by anyone who simply desires to do so. In Information Security, we call the sequential steps required for…
Joost Krapels
Enabling two-factor authentication: highly recommended
Many websites, including giants such as google, Facebook and Dropbox, have implemented an additional security feature called two-factor authentication. Unfortunately this extra security feature is normally turned off. We recommend turning two-factor authentication on immediately, because it will protect your account from being hacked. What is two-factor authentication Most websites ask for a username and password when…
Joost Schalken-Pinkster