Incentrium is a platform designed to easily manage, evaluate, and report share-based payment programs. Given the sensitive nature of the information it handles, it’s crucial that it is as secure as possible. Multi Factor Authentication (MFA) is becoming increasingly important in today’s world, where cyber attacks are on the rise and passwords alone are no longer enough to secure sensitive data. By requiring multiple forms of authentication, MFA makes it much more difficult for hackers to gain access to accounts or systems, even if they manage to obtain a user’s password.
To enhance Incentrium’s security posture, we recently added Multi-Factor Authentication (MFA) to the platform. This security mechanism requires users to provide multiple forms of authentication to access the platform. Incentrium opted to use Time-based One-Time Password (TOTP), which is a widely-used form of MFA that involves generating a one-time password that expires after a certain amount of time. The user must enter this password along with their password to gain access to the system. Third-party authenticator apps like Authy or Google Authenticator can generate TOTP codes, making it a convenient and effective form of MFA.
Incentrium’s decision to implement MFA with TOTP shows a commitment to protecting the sensitive data it handles. By requiring multiple forms of authentication, we have made it much more difficult for hackers to gain access to accounts, even if their common credentials have been compromised. Additionally, the use of a third-party authenticator apps means that users can choose the app that works best for them, making the authentication process as seamless as possible and independent of single vendors.
In conclusion, Multi-Factor Authentication is a vital security mechanism that helps protect sensitive data from cyber threats. Incentrium’s implementation of MFA with TOTP shows a commitment to enhancing its security posture and protecting the information it handles. By requiring multiple forms of authentication, Incentrium has made it much more difficult for hackers to gain access to accounts, and the use of third-party authenticator apps makes the authentication process as convenient as possible for users.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.