Published: 23 April 2020
This 2-min summary contains inputs from 15 members regarding their practices for verifying identity of users calling in to their IT help desks. It assess the types and number of elements that members use to verify users' identity. The summary also discusses whether sensitivity of requests alter members' user verification practices.
Included in Full Research
Consult the Board Research Team