Increased reliance on cloud computing puts more weight on robust authentication systems to protect data against hijackers.