Belt-and-braces security

Two-step authentication is best practice for secure user access – so let’s take it from step one

We’ve all worked from public hotspots or broadband connections at home. But isn’t it just a little bit scary to think that the two things protecting access to some of our most critical business data is a simple login ID (most probably based on the abbreviation of your name or email address) and a password?

User ...