Forum | Message

Tue, September, 25th 2018

}
2
BC:

Forum Question/Topic:

Article:

EMSS - 2 factor authentication (on-premise)

Do any of you that deploy EMSS on the internet utilize 2-factor authentication (after signing in, an additional step is processed to your phone to complete your login process). This is an extra security precaution to minimize and prevent phishing attacks?

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic  Read more...communication.

#Security Show less...
Human Capital Management
Security
Technology
Administering Lawson
Do any of you that deploy EMSS on the internet utilize 2-factor authentication (after signing in, an additional step is processed to your phone to complete your login process). This is an extra security precaution to minimize and prevent "phishing" attacks? Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. #Security
Delivered Read
2
Kimberly Jacobson likes this.
We were just introduced to a new tool that is perfect for this and integrates seamlessly with your system, easy to implement and very cost effective. Give us a call or find us at Inforum, we'd love to provide a demo.
We were just introduced to a new tool that is perfect for this and integrates seamlessly with your system, easy to implement and very cost effective. Give us a call or find us at Inforum, we'd love to provide a demo.
Perimeter MFA provides a secondary authentication protocol using such devices as your cell phone. There are many features that can be demonstrated here at Inforum DC 2018. Perimeter MFA protects your Infor Applications from unauthorized access due to breaches in authentication.

Come see us at booth 2008 in the Hub!
Perimeter MFA provides a secondary authentication protocol using such devices as your cell phone. There are many features that can be demonstrated here at Inforum DC 2018. Perimeter MFA protects your Infor Applications from unauthorized access due to breaches in authentication. Come see us at booth 2008 in the Hub!

Online