Quote:
Originally Posted by BigRedChief
they are going to have to get use to 2 factor. Any field that has anything resembling confidential data is going to have to implement 2 factor auth.
|
Yeah, just easier said than done when dealing with some who are set in their ways and used to telling others how they want things to operate.