Remove CIO Remove IP Remove Screening Remove Yahoo
article thumbnail

Interview with Jeff Kukowski, SecureAuth

socalTECH

Even with prominent breaches at Yahoo, LinkedIn, and others, how many consumers actually take the time to enable that second factor? All those layers and risk analysis people talk about only check very simple things, such as if someone is coming from a blocked IP from North Korea, or if I recognize the device. We are lazy.

IP 100