cybersecurity – best practices for protecting identities and assets

Click here to load reader

Post on 25-May-2015

130 views

Category:

Education

0 download

Embed Size (px)

TRANSCRIPT

  • 1. Two Factor Authentication must be Easy to Use.