boxorandyos

Client support portal

How to protect authentication devices

PURPOSE Phones, hardware tokens, and security keys used for authentication should be protected like keys to important systems. KEEP THEM SECURE Do not leave authentication devices unattended or lend them casually. USE DEVICE LOCKS Protect phones and tablets with passcodes or biometrics. REPORT LOSS QUICKLY Lost authentication devices should be reported immediately. BACKUP Maintain approved backup recovery methods when possible.

← Back to knowledge base