THANK YOU FOR SUBSCRIBING
Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Gov CIO Outlook
THANK YOU FOR SUBSCRIBING
By
Government CIO Outlook | Tuesday, April 26, 2022
Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.
Despite the current issues, the cyber community can collaborate to ensure security, privacy, and digital rights. To take advantage of the opportunity, governments must make necessary policies and take action on time.
Fremont, CA: A safe and secure password in today's world is a myth; even the most thought-through password is still a shared secret that both the application and the user must know and store on servers for authentication. As a result, they fall prey to a variety of attack tactics, such as phishing, brute force attacks, and malware. The most concerning trend is fraudsters' increasing use of phishing to deceive consumers into giving their login information. Policymakers will need to adopt solutions that move away from the shared secret paradigm while also being simple for consumers and employees to use as they try to address these authentication concerns.
Governments can improve their cybersecurity issues by following some of the principles stated below:
Have a strategy in place that specifically handles authentication: While strong authentication is only one component of a comprehensive strategy for cyber risk management, any cyber program that does not include it is severely inadequate.
Ensure that the authentication solutions are mobile-friendly: Any policy that is not aimed toward optimizing the use of MFA in the mobile environment will cannot sufficiently secure transactions completed in that environment as mobile transaction usage grows.
Focus on standards and objectives rather than a particular technology or solution: Authentication is undergoing a period of rapid change, with new, better technologies on the horizon. As a result, governments should focus on an authentication strategy based on principles that do not prevent the adoption of emerging technology.
Choose authentication systems that are simple to use to encourage wider usage; Users are frustrated by poor usability, which limits widespread adoption. Next-generation MFA solutions significantly minimize user friction while also enhancing security. Policymakers should explore ways to incentivize the usage of next-generation MFA that balances security and user experience.
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info