Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Wi-Fi Router Charts

Click for Wi-Fi Router Charts

Mesh System Charts

Click for Wi-Fi Mesh System Charts

In Conclusion

We have looked at a sampling of the current 2 Factor product segment. The uptake of these solutions certainly increases security considerably, and will allow sites to expand the services that are currently available online. There is a sting in the tail however. Given our previous article explaining Man in the Middle attacks, what actual use would a 2 Factor solution be when session hijacking was an issue?

That is the question that the security industry is targeting now.

All trademarks and registered trademarks referenced in this article are the property of their respective owners.

Pat McKenna is a Security Consultant and CTO with 2SA Plus, a company specializing in 2 Factor Authentication and matters of Identity Management. He is 45 and has been in the IT business for 15 years, during which he has held many positions, including company director. Prior to a career in IT, he worked in the security and intelligence field. He is proficient with many computer languages, old and new, and has trained hundreds of programmers.

His hobbies are chess and penetration testing, aka ethical hacking.

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Don't Miss These

  • 1
  • 2