How is device location used in cybersecurity?

Consider if a user typically logs in from Seattle on a daily basis when they arrive at their office at 9 a.m. If the user’s cell phone and laptop are in Seattle but the login attempt is from China, the MFA solution should either automatically block the login attempt prompt for additional authentication before automatically notifying the Security Operations Center.

Kayne McGladrey IEEE Senior Member

Great question! We don't have an answer ready for you right now. If you would like to help the community grow and learn please consider submitting this question to our Impact Creators. We will be posting answers to popular questions asked by the community as they become available.

Submit this question

Do you have a question for the IEEE Impact Creators?

Type your question here....

Close Navigation