Scott Alldridge
๐ค SpeakerAppearances Over Time
Podcast Appearances
Like, oh, we're going to email you code.
They first hack your email and then they will, of course, get your code just like they will your SMS.
So regular MFA, a lot of people aren't even using it.
It's still a good thing to use.
It's better than nothing.
But there's actually the next level, which is kind of an advanced MFA.
We call it in the book, there's a chapter called verified credential access.
It's more where we're using an app on your phone because that actually has a little crypto key on it.
And it's kind of decentralized.
So you're not just getting one point of a place to send you a code.
It's talking to another point.
Right.
Two different points is decentralized to authenticate and make sure that you are who you say you are while you're being connected.
It does regular check-in.
So it knows that it's you.
These are some of the practical things that, you know, businesses really have to implement and get serious about using.
That's just one of many things.
That's like a Google authenticator app, right?
Yeah.
Like a Google or Microsoft authenticator.