Measuring success

"Measuring success"

Who We Are

   metriQuality prepares companies for IT audits,  collecting required documentation, and implementing controls for information security and compliance with corporate policies and regulatory requirements.

How We Help

   By monitoring what your people and processes do,
we help to ensure compliance with corporate policies and regulatory requirements.

   By measuring resource utilization:

  Are your people working effectively?
  Are your projects and/or vendors delivering the results you expect?

What We Do

Policy Management   Write and review company policies and procedures

Compliance Controls   Monitor, assess, and improve compliance controls

Performance Management   Optimize business operations through performance audits

Security Awareness Training   Train and mentor staff for compliance and information security issues

Vendor Risk Management   Manage outsourced IT projects and third-party service providers

Vulnerability Assessments   Conduct security  assessments and  minimize risk exposure

Corporate Standards   Align corporate standards with generally accepted standards

Incident Response   Plan, coordinate, and respond to security incidents

 

Multi-Factor Authentication

   Multi-factor authentication ensures that a user is who they claim to be. The more factors used to determine a person’s identity, the greater the trust of authenticity. MFA can be achieved using a combination of the following factors:

  1. Something You Know - password or PIN

  2. Something You Have – token or smart card (two-factor authentication)

  3. Something You Are – biometrics, such as a fingerprint or iris scan.

   Because multi-factor authentication security requires multiple means of identification at login, it is widely recognized as the most secure method for authenticating access to data and applications.

Why is this important to you?

Imagine that every key you own, to your car, your home, your office, even your safe-deposit box could be easily duplicated, providing no security whatsoever. That time is rapidly approaching -- for your networks, your web browsers, all of your connected devices and the data they store and process.

Will you change your locks before or after a data breach? How will this change affect your customers and business partners?

   metriQuality helps provide strong authentication methods for protecting web applications and web service APIs from unauthorized access.

 

Additional MFA resources:


SwivelSecure
Yubico
Gemalto
FIDO Alliance

 

Are you sceptical?     You should be...

Simon Crosby, CEO of Bromium, told an audience at SecureWorld, "Every security vendor should tell their customers how their products' security can be broken."

Yes, there are ways to compromise 2-factor authentication. IBM offers a whitepaper highlighting which 2-factor products are vulnerable to phishing and man-in-the-middle attacks. The same could be said for encryption, firewalls, and other tools, but if you read the disclaimer at the document's end, you will also see why IBM's 2-factor solution is equally vulnerable. This whitepaper can be downloaded here at:
IBM - The pitfalls of two-factor authentication