- 
			          5 Different Two-Step Authentication Methods to Secure Your Online Accounts
			           
 Different services offer different two-step verification methods. But, when you set up two-step verification, you will often be able to choose between a few different methods. Here's how they work and how they differ. http://www.howtogeek.com/232598/5-different-two-step-authentication-methods-to-secure-your-online-accounts/
- 
			          3 Different Types of User Authentication - Cloud Entr
			           
 Encryption and data protection can be tricky areas to navigate. Even if all of a user's passwords are unique and complicated, authentication can still be compromised. http://www.cloudentr.com/latest-resources/industry-news/2014/1/10/3-different-types-of-user-authentication
- 
			          The Most Common Authentication Methods Used Today - Tweak and Trick
			           
 As the news of network security breaches reaches more eyes and ears, thanks to high profile cases like the recent LinkedIn incident where millions of passwords were compromised, both consumers and regulatory agencies are putting increasing pressure on those in charge of enterprise security to step up their defenses. http://www.tweakandtrick.com/2012/06/most-common-authentication-methods-used.html
- 
			          Seven Strong Authentication Methods - Network World
			           
 As promised last issue, I'm re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people's perceptions of online security. http://www.networkworld.com/article/2296774/access-control/seven-strong-authentication-methods.html
- 
			          Understanding and Selecting Authentication Methods - Tech Republic
			           
 If you are serious about computer/network security, then you must have a solid understanding of authentication methods.  Debra Littlejohn Shinder takes a moment to lay out the role authentication plays in a security plan. http://www.techrepublic.com/article/understanding-and-selecting-authentication-methods/
- 
			          Understanding Authentication, Authorization, and Encryption : Tech Web : Boston University
			           
 Information Services & Technology (IS&T) is staffed by more than 400 people who work in multiple buildings across the Charles River Campus. IS&T is organized around the framework of Service Management and many of our staff members are ITIL certified. http://www.bu.edu/tech/about/security-resources/bestpractice/auth/
- 
			          What is Authentication? - Techopedia
			           
 Authentication Definition - In the context of computer systems, authentication is a process that ensures and confirms a user's identity. https://www.techopedia.com/definition/342/authentication
- 
			          How to Set Up Two-Factor Authentication on Slack - The Atlantic
			           
 One of the most important security steps you can take is also one of the least intuitive. http://www.theatlantic.com/technology/archive/2015/03/how-to-set-up-two-factor-authentication-on-slack/388925/
- 
			          Authentication - Wikipedia
			           
 Authentication is the act of confirming the truth of an attribute of a single piece of data (a datum) claimed true by an entity. https://en.wikipedia.org/wiki/Authentication
- 
			          What is Authentication? - Tech Target
			           
 Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. http://searchsecurity.techtarget.com/definition/authentication