<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Authentication Archives - INTERACTIVE SOFTWARE</title>
	<atom:link href="https://www.interactivesoftware.co.uk/tag/authentication/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Interactive Software&#039;s Achiever Laboratory Information Management and Biobanking software, LIMS and CRM systems transform your business processes, help you to comply and deliver data insights</description>
	<lastBuildDate>Mon, 12 Apr 2021 09:16:44 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Authentication and why it’s important</title>
		<link>https://www.interactivesoftware.co.uk/2021/04/12/authentication/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=authentication</link>
		
		<dc:creator><![CDATA[Paul Ward]]></dc:creator>
		<pubDate>Mon, 12 Apr 2021 09:14:34 +0000</pubDate>
				<category><![CDATA[General Software]]></category>
		<category><![CDATA[Technology and Infrastructure]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<guid isPermaLink="false">https://www.interactivesoftware.co.uk/?p=19926</guid>

					<description><![CDATA[<p>The purpose of authentication is to confirm that a user is who they say they are. The authentication example most of us are familiar with is when signing-in to a website using a username and password. The username part of this combination is who the user claims to be. While the password is a way to confirm they are who they say they are. The website will verify the two pieces of information provided. If the password supplied matches the password for the username, sign in will be allowed. If the password doesn’t match, sign in will be denied. You can see that for anyone who possesses those two pieces of information, it would be possible to successfully claim to be someone else and impersonate their identity. This is why as a user we keep passwords secure by: Not reusing &#8211; Across different sites, services and applications Not writing down &#8211; On a Post-it note or in an email Avoiding the obvious &#8211; None of the most common Not sharing &#8211; With colleagues or family members Going long &#8211; The longer the password length, the harder it is for someone guess Methods for securing accounts and passwords There are other [&#8230;]</p>
<p>The post <a href="https://www.interactivesoftware.co.uk/2021/04/12/authentication/">Authentication and why it’s important</a> appeared first on <a href="https://www.interactivesoftware.co.uk">INTERACTIVE SOFTWARE</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
