The European General Data Protection Regulation (GDPR) will take effect on May 18, 2018. The GDPR requires businesses to comply with new rules for collecting, sharing, and protecting personal data within the borders of the European Union (EU) or when exporting information internationally. This applies to any organization that processes personal data of EU citizens, regardless of where that business is located. All companies that do business in Europe will be required to implement a range of security measures.
In the first part of this blog, we reviewed how vulnerable you can be while traveling and on a public Wi-Fi network. So how are some ways you can secure and protect your data and credentials while traveling? Here are a few ways:
1 – You could not use them. This is the safest, but not always a practical way. On a six hour plus flight, I could decide not to use the Wi-Fi. Let’s be real, I will definitely be using the Wi-Fi.
How do you protect the credentials on your device, while using Wi-Fi on an airplane or even while riding the train? As airplanes and trains are now being equipped with Wi-Fi access, the concern of your device being secure has grown. Even if your plane isn't Wi-Fi enabled, there's a good chance you will be tempted to sign into the airport Wi-Fi prior to your flight.
Organizations exploring potential Identity Access and Management (IAM) solutions often begin by determining how best to control the login and other activities of users who are on their own internal networks and/or connected by Virtual Private Network (VPN). This is a great first step but poses several challenges to the modern enterprise that should not be overlooked. The sooner additional factors are considered, the better overall security the organization can deploy.
What Are Geo-Location and Geo-Velocity in Identity Authentication?
Geo-location and geo-velocity are just two of the pre-authentication risk checks included in SecureAuth’s adaptive access control solution. Geo-location and geo-velocity can both offer different levels of protection, and may be employed independently or in tandem; but what exactly are they and how do they work?