dcsimg

Microsoft Give Office 365 Multi-Factor Authentication and Adds No-Cost Updates for Office 2013

WEBINAR:
On-Demand

Application Security Testing: An Integral Part of DevOps


In addition to Microsoft’s latest announcement about their added security features in Office 365, the same announcement featured the arrival of a new no-cost update for Office 2013 coming this year. Microsoft’s Office 365 update covers all Office 365 variants and subscriptions. In addition the new Multi-factor authentication adds another layer of security to the login by requiring a second validation after the initial password. It establishes the user is genuine with a phone call, text message, or an app notification on their smartphone after the correct password is entered. Not exactly ground breakingly new technology, but an effective multifactor authentication practice that is sure to add a high level trust and convenience in the system for user. Read the full story here.



Comments

  • There are no comments yet. Be the first to comment!

  • You must have javascript enabled in order to post comments.

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • It’s no surprise that there are gaps between Big Iron (invented in the middle of the last century) and Big Data (invented a decade ago). But bridging them together can bring great business value: Customer 360, Real-time Fraud Detection, Active Archive to name a few.    Moving mainframe data into Hadoop storage formats is non-trivial, and processing that data in Hadoop is a challenge as well. Without the right tools, you may end up stalling your Big Data …

  • This e-book features five case studies that illustrate how VMware has partnered with a variety of government entities to:    • Modernize IT infrastructure to boost agency performance and efficiency. • Leverage multiple clouds to improve resource allocation and operational models. • Mobilize personnel to improve citizen service delivery and mission outcomes. • Strengthen cybersecurity from data center to endpoint device.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date
×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.