To authenticate means to confirm that the request for access to corporate data or other resources is genuine, authentic or valid. Every time a hacker successfully phishes enterprise information, the ante is upped to find a more secure way to establish all network access points as valid.
The Myth of the “Strong” Password
Remember when there was so little valuable information stored outside the firewall that hackers didn’t even bother stealing passwords? Those days are long gone, but end-users still cling to the familiarity of the password, whether using it to authenticate to their online banking site or the enterprise network. Despite the password’s evolution into an alphanumeric, multi-character monster, however, it hasn’t kept pace with the changes in the security landscape. Today, there is simply no such thing as a password strong enough to keep a diligent hacker out.