{"id":82768,"date":"2024-08-14T12:04:30","date_gmt":"2024-08-14T04:04:30","guid":{"rendered":"https:\/\/version-2.com\/?p=82768"},"modified":"2024-08-07T12:08:43","modified_gmt":"2024-08-07T04:08:43","slug":"annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/08\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements\/","title":{"rendered":"Annoying but necessary: How to decrease the burden of authentication requirements"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82768\" class=\"elementor elementor-82768\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div id=\"content-c10808788\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em>Authentication mechanisms are a vital aspect of cybersecurity deserving adequate protection, but increasing complexity makes them an easier target. <\/em><\/p><p>Since American computer scientist Fernando Jos\u00e9 Corbat\u00f3 created <a href=\"https:\/\/www.smh.com.au\/national\/scientist-who-introduced-the-computer-password-20190717-p527zf.html\" target=\"_blank\" rel=\"noopener\">the first password-based authentication<\/a> in the 1960s, passwords have been an integral part of IT security all over the world. But while the principle of using a string of characters unknown to others remains the same, the world of computing has become exponentially more complex, where an average person now has <a href=\"https:\/\/nordpass.com\/blog\/how-many-passwords-does-average-person-have\/\" target=\"_blank\" rel=\"noopener\">168 passwords <\/a>out of which 87 are business-related.<\/p><p>This causes headaches not only for average users but also for IT admins who handle the secure authentication needs of hundreds if not thousands of employees within their companies who work with a number of applications and devices.<\/p><p>As a global leader in cybersecurity, ESET knows that businesses not only need reliable defenses against malware but also easy-to-use platforms helping them manage daily tasks including secure authentication.<\/p><p>To ease the authentication burden on IT admins, ESET has introduced <a href=\"https:\/\/help.eset.com\/esa\/30\/en-US\/?index.html\" target=\"_blank\" rel=\"noopener\">ESET Secure Authentication<\/a>, a <a href=\"https:\/\/www.eset.com\/int\/about\/newsroom\/press-releases\/products\/eset-reveals-a-new-cloud-native-authentication-solution-1\/\" target=\"_blank\" rel=\"noopener\">cloud-based solution running on a single dashboard<\/a>, that provides multifactor authentication for multiple applications.<\/p><\/div><div id=\"content-c10808789\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Beloved targets<\/h3><\/header><p>Credentials are among cybercriminals\u2019 most beloved attack vectors. According to the <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/2024-dbir-data-breach-investigations-report.pdf\" target=\"_blank\" rel=\"noopener\">Verizon 2024 Data Breach Investigations Report<\/a>, 77% of basic web Application Attacks involved stolen credentials, 21% of them were the result of brute force (usually easily guessable passwords), and 13% of those attacks exploited vulnerabilities.<\/p><p>The authors of this report also highlighted the fact that over the past 10 years, stolen credentials have appeared in almost one-third (31%) of all analyzed breaches, making credentials a core component of compromising organizations.<\/p><p>Globally, over <a href=\"https:\/\/www.statista.com\/statistics\/1441180\/cyber-breach-as-a-result-of-authentication-weaknesses-worldwide\/\" target=\"_blank\" rel=\"noopener\">80% of respondents<\/a> experienced a cyber breach due to authentication vulnerabilities in 2023, and consequences could be detrimental.<\/p><p>In 2023, the <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2023_IC3ElderFraudReport.pdf\" target=\"_blank\" rel=\"noopener\">FBI received 7,333 complaints<\/a> about personal data breaches involving a leak or the abuse of personal data. The cumulative loss of these breaches reached over $109,000,000.<\/p><p>There is no surprise that the importance of password security is widely recognized and can be seen, for example, among polled small and medium-sized businesses (SMEs) in the U.S., U.K., and France in <a href=\"https:\/\/jumpcloud.com\/press\/tool-sprawl-external-threats-and-security-are-top-concerns-for-it-admins\" target=\"_blank\" rel=\"noopener\">JumpCloud\u2019s 2023 Flexibility and Ingenuity Survey<\/a>. The survey shows that 64% of SMEs use an organization-wide password management tool or software, and 10% plan to implement one this year. For those who don\u2019t use password management, cost is the biggest factor.<\/p><\/div><div id=\"content-c10808790\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">When a security practice becomes an attack vector<\/h3><\/header><p>But there\u2019s also another aspect to password security. Having a robust cybersecurity solution including multi-factor authentication (MFA) is great, but at the same time, it creates new challenges for both users and IT admins.<\/p><p>The problem among users is that they can become so irritated by repeating MFA authentication requests that they lose their vigilance. And there are already cases of<a href=\"https:\/\/portswigger.net\/daily-swig\/mfa-fatigue-attacks-users-tricked-into-allowing-device-access-due-to-overload-of-push-notifications\" target=\"_blank\" rel=\"noopener\"> MFA fatigue attacks<\/a> proving that.<\/p><p>At the beginning of an MFA fatigue attack or an MFA bombing, attackers need to obtain targets\u2019 credentials via phishing, brute force, password spraying, etc. Once the targets\u2019 credentials are stolen, attackers start to bombard them with 2FA push notifications in the hope that they will click on \u201caccept,\u201d and thus authorize the attackers\u2019 login attempts, at least once.<\/p><p>On the other hand, IT admins, already struggling with <a href=\"https:\/\/www.devo.com\/wp-content\/uploads\/2023\/09\/Devo-Cybersecurity-Burnout-Survey-Quick-Read-Report.pdf\" target=\"_blank\" rel=\"noopener\">portal and alert fatigue<\/a>, have gained new responsibilities related to MFA system administration, such as update or alert management.<\/p><p>That is why, for example, the <a href=\"https:\/\/www.cyber.gc.ca\/en\/guidance\/steps-effectively-deploying-multi-factor-authentication-mfa-itsap00105\" target=\"_blank\" rel=\"noopener\">Canadian Centre for Cyber Security advises<\/a> balancing overall user experience and security protection to maximize security and minimize disruptions.<\/p><p><strong>Here are some other pieces of advice on improving user experience and reducing the burden on IT resources:<\/strong><\/p><ul><li>Run both an awareness campaign and training to educate users.<\/li><li>Allow users the flexibility to use different types of factors, where possible, such as security keys, biometrics, or PIN.<\/li><li>Give users the possibility to provide feedback on their MFA experience.<\/li><li>Implement MFA with a single sign-on (SSO) application to automatically log authorized users in to their connected accounts.<\/li><li>Provide users with a backup MFA factor and set up an easy way to reset them on their own in case their primary factor is lost, unavailable, or compromised.<\/li><li>Monitor MFA events and check authentication reports to detect anomalous login activities.<\/li><li>Allow users the ability to disassociate a lost or stolen device\/security key from their account.<\/li><\/ul><\/div><div id=\"content-c10808791\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">An end to hard times<\/h3><\/header><p>Because users often struggle with distributed authentication, split between services, and endpoint, IT admins have a hard time maintaining and upgrading such infrastructure. ESET Secure Authentication aims to take those responsibilities from users\u2019 hands:<\/p><ul><li>With ESET Secure Authentication, ESET oversees maintenance and upgrading, keeping them scalable, and hunting vulnerabilities.<\/li><li>The new dashboard shows admins how many users are protected and unprotected, any failed logins, etc. so they can see gray areas that can be improved.<\/li><li>Admins don\u2019t need to create business invitation cards. They just create an installer, grab it, install it on users\u2019 devices, and enroll them.<\/li><li>Authentication solutions from other vendors are supported.<\/li><\/ul><\/div><div id=\"content-c10808792\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c10808793\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Less maintenance, more protection<\/h3><\/header><p>Secure authentication is a vital aspect of cybersecurity but can also easily get on one\u2019s nerves. Repeated authentication, changing passwords, and doing it on several applications can lead to users\u2019 MFA fatigue and simultaneously drain the IT staff administrating it.<\/p><p>And it\u2019s not only about keeping users and IT admins happy but also securing businesses that can be endangered by FMA fatigue.<\/p><p><span lang=\"EN-US\">With ESET Secure Authentication, businesses can increase automation and reduce maintenance duties for IT admins, thus increasing their resilience against credential-based attacks.\u00a0<\/span><i class=\"arrow\"><\/i><\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Authentication mechanisms are a vital aspect of cyberse [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[41,1272],"class_list":["post-82768","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-eset","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Annoying but necessary: How to decrease the burden of authentication requirements - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/new-products\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Annoying but necessary: How to decrease the burden of authentication requirements - Version 2\" \/>\n<meta property=\"og:description\" content=\"Authentication mechanisms are a vital aspect of cyberse [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/new-products\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-14T04:04:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Annoying but necessary: How to decrease the burden of authentication requirements\",\"datePublished\":\"2024-08-14T04:04:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements\\\/\"},\"wordCount\":912,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"ESET\",\"2024\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\\\/\",\"name\":\"Annoying but necessary: How to decrease the burden of authentication requirements - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2024-08-14T04:04:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/new-products\\\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Annoying but necessary: How to decrease the burden of authentication requirements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Annoying but necessary: How to decrease the burden of authentication requirements - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/new-products\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\/","og_locale":"zh_HK","og_type":"article","og_title":"Annoying but necessary: How to decrease the burden of authentication requirements - Version 2","og_description":"Authentication mechanisms are a vital aspect of cyberse [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/new-products\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\/","og_site_name":"Version 2","article_published_time":"2024-08-14T04:04:30+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/new-products\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/08\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Annoying but necessary: How to decrease the burden of authentication requirements","datePublished":"2024-08-14T04:04:30+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/08\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements\/"},"wordCount":912,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["ESET","2024"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/new-products\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/08\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements\/","url":"https:\/\/www.eset.com\/blog\/new-products\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\/","name":"Annoying but necessary: How to decrease the burden of authentication requirements - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2024-08-14T04:04:30+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/new-products\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/new-products\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/new-products\/annoying-but-necessary-how-to-decrease-the-burden-of-authentication-requirements-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Annoying but necessary: How to decrease the burden of authentication requirements"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-lwY","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/82768","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=82768"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/82768\/revisions"}],"predecessor-version":[{"id":82775,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/82768\/revisions\/82775"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=82768"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=82768"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=82768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}