Mar 15, 2017,
by Thomas Barton
It should surprise few how rapidly two-factor authentication, or multifactor authentication (MFA), is being adopted. More and more organizations are deploying it to segments of their users (or to all of them) to protect critical systems and data from being breached due to a phished password. Root access to systems, privileged access to applications and databases, and remote access to critical systems by unauthorized persons are among the leading risks being addressed with MFA.