- 	
					                 		        				  								  
					 			      	5 Different Two-Step Authentication Methods to Secure Your Online Accounts
					 			      	 
 Different services offer different two-step verification methods. But, when you set up two-step verification, you will often be able to choose between a few different methods. Here's how they work and how they differ. http://www.howtogeek.com/232598/5-different-two-step-authentication-methods-to-secure-your-online-accounts/
- 	
					                 		        				  								  
					 			      	3 Different Types of User Authentication - Cloud Entr
					 			      	 
 Encryption and data protection can be tricky areas to navigate. Even if all of a user's passwords are unique and complicated, authentication can still be compromised. http://www.cloudentr.com/latest-resources/industry-news/2014/1/10/3-different-types-of-user-authentication
- 	
					                 		        				  								  
					 			      	The Most Common Authentication Methods Used Today - Tweak and Trick
					 			      	 
 As the news of network security breaches reaches more eyes and ears, thanks to high profile cases like the recent LinkedIn incident where millions of passwords were compromised, both consumers and regulatory agencies are putting increasing pressure on those in charge of enterprise security to step up their defenses. http://www.tweakandtrick.com/2012/06/most-common-authentication-methods-used.html
- 	
					                 		        				  								  
					 			      	Seven Strong Authentication Methods - Network World
					 			      	 
 As promised last issue, I'm re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people's perceptions of online security. http://www.networkworld.com/article/2296774/access-control/seven-strong-authentication-methods.html
- 	
					                 		        				  								  
					 			      	Understanding and Selecting Authentication Methods - Tech Republic
					 			      	 
 If you are serious about computer/network security, then you must have a solid understanding of authentication methods.  Debra Littlejohn Shinder takes a moment to lay out the role authentication plays in a security plan. http://www.techrepublic.com/article/understanding-and-selecting-authentication-methods/
- 	
					                 		        				  								  
					 			      	Understanding Authentication, Authorization, and Encryption : Tech Web : Boston University
					 			      	 
 Information Services & Technology (IS&T) is staffed by more than 400 people who work in multiple buildings across the Charles River Campus. IS&T is organized around the framework of Service Management and many of our staff members are ITIL certified. http://www.bu.edu/tech/about/security-resources/bestpractice/auth/
- 	
					                 		        				  								  
					 			      	What is Authentication? - Techopedia
					 			      	 
 Authentication Definition - In the context of computer systems, authentication is a process that ensures and confirms a user's identity. https://www.techopedia.com/definition/342/authentication
- 	
					                 		        				  								  
					 			      	How to Set Up Two-Factor Authentication on Slack - The Atlantic
					 			      	 
 One of the most important security steps you can take is also one of the least intuitive. http://www.theatlantic.com/technology/archive/2015/03/how-to-set-up-two-factor-authentication-on-slack/388925/
- 	
					                 		        				  								  
					 			      	Authentication - Wikipedia
					 			      	 
 Authentication is the act of confirming the truth of an attribute of a single piece of data (a datum) claimed true by an entity. https://en.wikipedia.org/wiki/Authentication
- 	
					                 		        				  								  
					 			      	What is Authentication? - Tech Target
					 			      	 
 Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. http://searchsecurity.techtarget.com/definition/authentication