Amazines Free Article Archive
www.amazines.com - Friday, April 19, 2024
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133573)
 Advice (161671)
 Affiliate Programs (34799)
 Art and Culture (73855)
 Automotive (145712)
 Blogs (75614)
 Boating (9851)
 Books (17223)
 Buddhism (4130)
 Business (1330637)
 Business News (426446)
 Business Opportunities (366518)
 Camping (10973)
 Career (72795)
 Christianity (15848)
 Collecting (11638)
 Communication (115089)
 Computers (241952)
 Construction (38962)
 Consumer (49953)
 Cooking (17080)
 Copywriting (6733)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20319)
 Dating (45908)
 EBooks (19703)
 E-Commerce (48258)
 Education (185521)
 Electronics (83524)
 Email (6438)
 Entertainment (159854)
 Environment (28970)
 Ezine (3040)
 Ezine Publishing (5453)
 Ezine Sites (1551)
 Family & Parenting (111007)
 Fashion & Cosmetics (196605)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310615)
 Fitness (106469)
 Food & Beverages (63045)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25202)
 Government (10519)
 Health (630137)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91657)
 Home Improvement (251210)
 Home Repair (46243)
 Humor (4723)
 Import - Export (5459)
 Insurance (45104)
 Interior Design (29616)
 International Property (3488)
 Internet (191030)
 Internet Marketing (146687)
 Investment (22861)
 Islam (1161)
 Judaism (1352)
 Law (80506)
 Link Popularity (4596)
 Manufacturing (20914)
 Marketing (99316)
 MLM (14140)
 Motivation (18233)
 Music (27000)
 New to the Internet (9496)
 Non-Profit Organizations (4048)
 Online Shopping (129734)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12689)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126700)
 Recreation & Leisure (95495)
 Relationships (87674)
 Research (16182)
 Sales (80350)
 Science & Technology (110290)
 Search Engines (23514)
 Self Improvement (153300)
 Seniors (6220)
 Sexuality (36010)
 Small Business (49311)
 Software (83033)
 Spiritual (23516)
 Sports (116155)
 Tax (7663)
 Telecommuting (34070)
 Travel & Tourism (308304)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11790)
 Website Design (56919)
 Website Promotion (36663)
 World News (1000+)
 Writing (35844)
Author Spotlight
TAL BARNEA

Tal is an electrical engineer with over 25 years of expertise with hardware, software, mechanical an...more
MANMOHAN SINGH

Digital marketing professional with 8 years of experience. A good listner, Stratgist and fun loving ...more
LEMUEL ASIBAL

Lemuel Asibal is a web content writer who also ventures on writing articles and blog posts about any...more
TUSHAR BHATIA

Tushar Bhatia is the Founder President of EmpXtrack Inc with over 19 years of experience in the soft...more
BRENDA PANIN

Passionate blogger and a great animal lover. ...more


Importance of Securing E-Mail ID's with Two Factor Authentication by Tarun Wig





Importance of Securing E-Mail ID's with Two Factor Authentication by
Article Posted: 07/04/2013
Article Views: 462
Articles Written: 12
Word Count: 699
Article Votes: 0
AddThis Social Bookmark Button

Importance of Securing E-Mail ID's with Two Factor Authentication


 
Computers,Internet,New to the Internet
The Internet Revolution has changed the way people communicate with each other. Letters, couriers, registered post, etc have been replaced by the ubiquitous email large volumes of documents can be immediately transferred via emails at a click of a button.

Free or paid mail services have become a warehouse of personal information where everything from personal and professional mails, chats, contacts etc are stored. While an email address is necessary to log in to almost every popular social media forum – from Facebook, Twitter to LinkedIn, business transactions including proposals, RFP’s, financial details, etc., are frequently transferred on mails as well.

A mail account today has become one of the most important IT assets of an individual, literally defining one’s identity on the internet.

In such a situation, unauthorized access to one’s mail accounts can have unforeseeable ramifications not just for an individual but also for a complete organization – leakage of financial and marketing data, R&D papers, IP of a company, HR policies, and other such confidential information ensures that more than one organization gets affected by an unauthorized access to an account of a key personnel.

This has led to unfortunate set of circumstances where rival companies hire groups of cyber criminals to target digital information of key personnel’s on the opposite side. Phishing, Social Engineering, customized malware to capture users mail credentials are rampantly being used to hack into mail ID’s.

Over the last few years stealing digital information from user’s accounts has evolved from local ad-hoc hacking attacks into an internationally co-ordinated fraud on a massive scale.

With thousands of people in an organization unaware of the security implications or know how of protecting their mail accounts, it becomes important for the organizations involved to protect their digital identity.

(India is specifically targeted in roughly 10 percent of the world's phishing scams designed to lure online users to look-alike Web sites, where they are tricked into providing their personal mail accounts passwords, bank account numbers and more.)

Securing Mail ID’s with Two Factor Authentication

While most of the free mail services such as Gmail, Hotmail (Microsoft has just joined the bandwagon), and others provide users with a chance to login using 2FA. Corporates usually deploy mail exchange servers within their premises. Some of the popular mail exchange servers include Microsoft Exchange server, Zimbr and Oracle communications messaging server, among others.

Users log into their corporate mails either using GUI or download their mails using one of the desktop agents such as Microsoft Outlook or Thunderbird. While most corporates usually have policies to restrict sharing of passwords and changing passwords after every ‘x’ number of days, these policies are human dependent and as a result prone to errors.

Most corporate prefer to integrate their mail ID’s with Two Factor Authentication where the One Time Password is generated and sent to the user via SMS or generated using a Hard Token (A small key which generates a new password after specific intervals of time. The password is shown to the user on a LCD display screen), or a Mobile Token (An application to generate an OTP is installed on the phone itself)

RSA, VASCO, Innefu etc are some of the popular companies providing Two Factor Authentication to companies to protect their Mail infrastructure.

The integration is different for different scenarios but usually an agent is installed on the client’s application server to prompt the user to enter a One Time Password. The OTP is then validated by the authentication server, while the user name and password are validated as usual.

For desktop mail clients such as Microsoft Outlook, a separate agent is installed which checks for all authentication requests. The user is required to enter his normal password followed by the OTP. The agent breaks the requests in two parts, gets the OTP validated by the Authentication server while the password is validated as normal.

If you are one of the organizations which haven’t integrated 2 Factor Authentication with your mail architecture – and most organizations are yet to do that, you may be a potential target for a kid yet to complete his high school to a cyber criminal making money working for your rivals.

Related Articles - Two Factor Authentication, 2 factor authentication, Hard Token, dual factor authentication,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
SUSAN FRIESEN

Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
SHALINI MITTAL

A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
JAMES KENNY

James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2024, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license