Feb. 8, 2023, 4:04 a.m. | Howard Solomon

IT World Canada www.itworldcanada.com

ID cards and USB keys should be used for accessing sensitive data, or by those with elevated privleges

authentication authenticators data di keys nist phishing postmedia security security strategies sensitive data top story usb

More from www.itworldcanada.com / IT World Canada

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States