Exclusive: Epsilon locks down with grid pattern log-in

Powered by SC Magazine
 

'Strong authentication' introduced to stamp out further data breaches.

Online marketing giant Epsilon has implemented a new authentication system after disclosing a significant leak of customer data last month.

The new authentication system has been in hot demand from customers after repeated lapses in the company’s cyber security forced embarrassing apologies from the likes of Dell, Hilton Hotels, Target and Citigroup.

The system, described by Epsilon as “strong authentication”, requires users to complement existing user names and passwords with a third factor.

This additional factor appears to be a variant of pattern-based authentication, similar to the technology used by UK provider GrIDsure. iTnews has been unable to determine precisely who developed the technology.

Epsilon is sending customers a one-time username and password to set up the system.

Customers then have to choose a six to ten digit “token pattern” by choosing six cell values presented on a grid and typing them into a text field.

 

A screenshot of the new authentication tool

 

The system does not allow the user to choose a pattern of cells that are too simple (no straight vertical, horizontal or diagonal lines).

This “grid pattern token” is then required to log-in to the system at all times.

Remember to sign up to our Security bulletin for the definitive summary and analysis of Infosec threats.

Copyright © iTnews.com.au . All rights reserved.


Exclusive: Epsilon locks down with grid pattern log-in
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 432

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 208

Vote