Two-Factor Authentication |
Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are. |
Trojan |
A Trojan is also known as Trojan horse. It is a type of malicious software developed by hackers to disguise as legitimate software to gain access to target users systems. |
Threat |
A threat is a possible danger that might exploit a vulnerability to violate security protocols and thus, cause possible harm. |
Tailgating |
Tailgating involves someone who lacks the proper authentication following an employee into a restricted area. |
Tablet |
A tablet is a wireless, portable personal computer with a touchscreen interface. |