In this video, Editor and Chief of E-Leraning Ed Baker walks through implementing MFA and shares how this can bring even tighter secutiry to corporate resources. MFA requires two or more authentication methods and enables you to choose from passwords, phone verification, or personal biometrics. It also allows you to set up specific parameters on when MFA will be necessary for logging in.
Latest posts by Ashley Troutman (see all)
- WATCH: Updates to Microsoft Intune on Azure - April 21, 2017
- 4 Virtual Mobile Infrastructure Vendors to Watch in 2017 - April 18, 2017
- REPORT: Most Enterprises Unprepared for Cyberattacks - April 17, 2017