Avoid Using Single Sign On with Sensitive Corporate Data

For your sensitive data you will want to make sure that you avoid using single sign on authentication. This method allows users to input a single user ID and password, in order to gain access to all resources, systems and networks. Anyone who knows the user’s log in information can gain access from any computer connected to your network. Instead, you will want to use other methods, to avoid unauthorized access, such as two factor authentication or USB tokens.

Replace Single Sign on Authentication with More Secure Methods

There are several different situations where you can replace single sign on authentication methods with more secure methods. These include internet access, VPN access, cloud computing environments, smart phone mobile access, VOIP access, and SaaS access. Each of these situations often places your users in situations, where they are relying on public networks, in order to transmit and receive information. They may also be working in public locations, where anyone could easily look over their shoulder and discover their user ID and password. However, by initiating a second form of authentication, you can eliminate potential threats.