Access RouterOS using Multi-Factor Authentication, Didiet Kusumadihardja (Didiet Kusumadihardja, Indonesia). With various data breach events happening in the world, we cannot rely solely on using username and password. Data breach is not only at the application level. Data breaches also occur in network devices such as MikroTik. We as network administrators must apply more security to the authentication of our MikroTik devices.
Didiet Kusumadihardja. Private Cyber Security Consultant with 12 years of experience in IT. Policy, Procedure, and Technical.. PDF: https:https://mum.mikrotik.com/presentations/ID18/presentation_6172_1540260014.pdf.
Didiet Kusumadihardja. Private Cyber Security Consultant with 12 years of experience in IT. Policy, Procedure, and Technical.. PDF: https:https://mum.mikrotik.com/presentations/ID18/presentation_6172_1540260014.pdf.
- Category
- MikroTik
- Tags
- mikrotik, routerboard, routeros
Be the first to comment