TWO-FACTOR AUTHENTICATION
A lot of us already know that the weakest link in any IT deployment are the people who use it. And that’s not just the angry cynicism of a systems administrator who’s spent his 4th sleepless night fixing a huge emergency, fueled by nothing but energy drinks, fast food, and despair (although they do tend…