Industry Insights

Blog, Tip of the Week

Tip of the Week: Making Sure Your 2FA is A-Okay

by | Wednesday, May 5th, 2021

Here’s the thing: even if your password policy is airtight and perfectly followed, relying on passwords alone isn’t enough anymore to secure your business. Some of today’s threats are just too capable of cracking them. In order to really preserve your business’ security, most security professionals (like us) recommend implementing two-factor authentication—however, it pays off to consider your options, and how much (if any) added security each has to offer.

For this week’s tip, let us consider the different ways to implement 2FA.

Let’s make something clear from the start:

Two-factor authentication of any kind is better than just relying on a password. After all, a password can be cracked, stolen, or guessed. Adding a second requirement for a proof of identity will prevent that from enabling access to your accounts so easily. Therefore, while some forms are often more reliable than others, two-factor authentication is always something to implement wherever possible—particularly in the workplace.

Types of Two-Factor Authentication

2FA comes in all shapes and sizes:

Text Messages

Chances are this is the form of 2FA that most people were first introduced to, as it simply requires you to provide the code that you receive to your mobile device via SMS.  This method is simple to pick up, making it easily accessible for any user and convenient. However, with the prevalence of phishing today amongst other considerations, 2FA through SMS is perhaps the least secure option, but it will still do in a pinch.

Applications

Next, we have the 2FA that functions by generating a code for the user to input into when prompted. Using these kinds of applications effectively turns a mobile device into the key for a lock, as a user isn’t going to get past the lock without access to their device. This makes the successful implementation of this form of 2FA heavily reliant on the likelihood that your users will both keep their devices charged and have them with them whenever they are needed.

Physical Devices

This variety of user authentication—where a physical token is plugged into a device or activated—has seen a resurgence in popularity in recent years, largely due to the rise in phishing attacks and other scams. While these keys come at some financial cost, they have been acknowledged as a successful and secure means of ensuring that someone is who they claim to be as they access digital resources.

Biometrics

Alternatively, we have also seen a rise of authentication wherein the user is the key, providing an identifier (like a fingerprint) to the scanner in order to secure access. While this form of authentication is undeniably (and sometimes literally) handy, it can be somewhat temperamental and lead to inaccuracy at times.

So, Which Type of 2FA is Best?

In simple terms: whatever kind you will actually use.

While they may not all be equally secure, any of the above options are more secure than just relying on a password alone. Data is just too valuable to be taken for granted nowadays, so if it is implemented and utilized correctly, any variety of two-factor authentication will ultimately benefit your business’ data and network security strategies.

We can help you put two-factor authentication in place, as well as any other cybersecurity measure or productivity tool your business could benefit from. Find out more about all we can do by calling 1-855-405-8889 today.

A Glimpse Into What Compliance Looks Like for Businesses

It’s easy to see all the reasons why you should make data regulations and compliance a priority. After all, you want to ensure you don’t violate the trust and security of your customers, as well as the integrity of your operations. If you make even one mistake, it...

AI Search Isn’t There Yet

People do this all the time: if they don’t know an answer, they just make something up that sounds right. It turns out AI has the same bad habit. A Study Put AI Search to the Test, and It Did Not Go Well Researchers at the Tow Center for Digital Journalism (part of...

Remote Work Is Great, but There Are Some Pitfalls

Do you have employees working remotely? If you do, the real question is, are you doing everything you can to keep them productive and secure? Remote work is awesome, but it comes with its fair share of risks. Today, we get into how to competently confront them. Remote...

Hiring IT is Hard (Here’s How to Make It Easier)

Do you have someone on your staff who can handle most IT-related issues for your business? If not, we’re sure your organization feels it in more ways than one. The issues that come from not having IT help are only made more frustrating when it comes time to find IT...

Let’s Take the Lid Off of CAPTCHA

We've officially reached the point where humans have to prove they're, well, human just to access websites. One of the most common ways to do this? CAPTCHA. CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. It might sound...

Automation Isn’t Always the Best Business Option

Automation makes sense from an operations standpoint, and people see this despite the many who advocate for scaling back to save jobs. For every task that can be completed, however, less than half can be automated. When you consider all the tasks that a human might be...

More Reading from Industry Insights:

AI Search Isn’t There Yet

People do this all the time: if they don’t know an answer, they just make something up that sounds right. It turns out AI has the same bad habit. A Study Put AI Search to the Test, and It Did Not Go Well Researchers at the Tow Center for Digital Journalism (part of...

Hiring IT is Hard (Here’s How to Make It Easier)

Do you have someone on your staff who can handle most IT-related issues for your business? If not, we’re sure your organization feels it in more ways than one. The issues that come from not having IT help are only made more frustrating when it comes time to find IT...