facebook linkedin twitter

Computerware Blog

Start Using Two-Factor Authentication Everywhere, Today

Start Using Two-Factor Authentication Everywhere, Today

It can be easy to slack off when it comes to good password practices. Many users still use the same password across multiple sites and often don’t use secure passwords. Password managers make this a lot easier, but it’s really two-factor authentication (2FA) that can make all the difference. Strong, unique passwords are still important (not all accounts offer two-factor authentication) but let’s talk about why you should always enable two-factor or multifactor on all of your accounts when possible.

Getting into my programs or logged onto different websites has been easy enough by using a password management tool, especially since there are settings that can be enabled to remember a specific device. When logging on from a different device, my phone or email is immediately hit with a notification. It’s a PIN, and without the PIN there is virtually no chance of logging in. This might be annoying if my phone isn’t on me and I’m sent a text notification, but let’s be honest, I don’t go anywhere without my phone, it’s my most valuable tool. 

So, you might have tried 2FA before or you might have been endlessly hitting the “ask me later” option that you are prompted with on new software that implemented the additional authentication measures. Whether you decide to use it or not there is one indisputable statement regarding this feature: two-factor authentication makes your accounts more secure. 

What Is Two-Factor Authentication

Even if you haven’t used 2FA, you’ve probably seen it in action. In fact, many sites, like bank accounts, Google, and Facebook might force a type of 2FA on you. If you’ve ever logged into a website from a different computer and then received an email or notification on your phone that a login from an unknown location just happened - that’s two-factor authentication. Albeit, it’s the reactive version that doesn’t do much to prevent others from gaining access to your information. Let’s not rely on being reactive, and look at true two-factor authentication.

By definition, two-factor or multi-factor authentication is an authentication method in which a computer user is granted access only after successfully presenting two pieces of evidence to an authentication mechanism: knowledge, and possession.

Knowledge: This is your password. You’ve memorized it or stored it securely in a password manager. The idea is that only you know it or have access to that information. In events where you don’t know your password, some sites might also accept your full email address or phone number in order to reset your password.

Possession: This is something that you own and almost always have in your possession. This is typically your smartphone, but other methods might have you carrying around a USB thumb drive or an electronic key that generates a random number.

The instantaneous code that is sent provides one more feature. It acts as an informant. If somebody were to log into one of my accounts with my password, I would find out instantly. Even then, they wouldn’t be able to get the PIN from my text message or authenticator app to finish the login process. This tells me I should change my password immediately, but otherwise my account should be safe.

Don’t Assume You are Safe

Enabling two-factor authentication won’t entirely protect you from threats or breaches. If you have two-factor set up on Facebook, Facebook can still get breached and passwords could be stolen. We see this happen all the time, with high profile attacks on large online entities stealing millions of records in a shot.

Following the other password best practices, like using strong passwords and never using the same password on two accounts is critical.

Recently, we saw the launch of Disney+, and it was reported that several thousand users had their brand-new accounts hijacked within hours of the launch of the service. This wasn’t because Disney was hacked; hackers just attempted to log in to steal accounts with emails and passwords they already had from some other data breach. 

Phishing attacks are plaguing millions of inboxes every single day. These attacks replicate the website in which they are impersonating, with a realistic login screen. Users are tricked to go there, fill in their information, and the credentials are directly sent to the cybercriminals.

As previously mentioned, 2FA isn’t the fix-all to cybersecurity. It does however put one more step between you and an ill-willed cybercriminal. Computerware has many more tips to help your business become more secure. If you would like to talk to one of our experts, give us a call at (703) 821-8200. 

A Recent Data Theft Shows Us What to Watch Out For
Examining the Relationship Between Professional Se...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, December 11, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Microsoft Hardware Workplace Tips Network Security Backup Managed Service Provider Productivity Hosted Solutions Business Email Malware IT Services Saving Money Efficiency Computer Productivity Google User Tips IT Support Small Business Innovation Smartphones Mobile Devices Data Backup VoIP Quick Tips Business Continuity Gadgets communications Collaboration Microsoft Office Network Social Media IT Support Android Disaster Recovery Upgrade Data Recovery Server Mobile Office Cybersecurity Virtualization Communication Smartphone Mobile Device Management Miscellaneous Phishing Ransomware Windows 10 Tech Term Windows Passwords Apps Facebook Operating System Unified Threat Management Outsourced IT Holiday Vendor Management Remote Monitoring Automation Managed IT Services Mobile Computing BDR BYOD Remote Computing Users Internet of Things Mobile Device Analytics Managed IT services Apple WiFi History Marketing Data Management The Internet of Things Artificial Intelligence Save Money Firewall Browser Help Desk Big data Windows 10 App Alert Cloud Computing Encryption Spam Office 365 Training Two-factor Authentication Bandwidth Business Technology IT Consultant Bring Your Own Device Antivirus Maintenance Printer Hard Drives Content Filtering Information Technology Health Gmail Going Green Government Office Cybercrime Retail Wireless Technology Windows 8 Outlook Cost Management Search Information Hiring/Firing Tech Support Virus Budget Saving Time Best Practice Computers Lithium-ion Battery VPN Managed Service Managed IT Employer-Employee Relationship Networking Hacking Project Management Money Document Management Healthcare Access Control Customer Service It Management Windows 7 IBM Travel Phone System Blockchain Education Data Loss Recovery Update Risk Management Data Breach Administration Value Password Save Time Legal Hacker Downtime Regulations Avoiding Downtime Humor Proactive IT SaaS Computing Running Cable iPhone File Sharing Law Enforcement Applications Hard Drive Intranet Twitter Compliance Mobility Website Patch Management Solid State Drive Current Events Data storage Augmented Reality Conferencing PowerPoint Word Cryptocurrency Laptop Monitoring Business Growth Business Intelligence Private Cloud Cortana Digital Fax Server Digital Payment Telephony Websites Router Management Machine Learning Vulnerabilities Telephone Systems Comparison Tablet Paperless Office Sports Company Culture Vendor Disaster User Computer Repair Hosted Solution End of Support Social Networking Social Robot Data Security Securty Excel Wireless Google Maps DDoS Storage Customer Relationship Management Social Engineering Scam Black Market Flexibility Computing Infrastructure Hack Voice over Internet Protocol Redundancy eWaste Google Docs Net Neutrality Text Messaging Meetings Memory Webcam How To Experience Chrome Download Evernote Wi-Fi Lifestyle Monitors Virtual Assistant Cleaning Office Tips Multi-factor Authentication Start Menu Tech Terms Computer Accessories Microchip Taxes Telephone Processors Distributed Denial of Service USB Managed IT Service Mobile Technology YouTube Inbound Marketing Trending Presentation Cooperation Software as a Service Unified Communications Settings Uninterrupted Power Supply Mouse Public Cloud Licensing Pain Points Virtual Desktop Processor Specifications Safety Vulnerability Identity Theft Statistics Bitcoin Programming Data Protection IT service Network Congestion Documents Teamwork Heating/Cooling Distribution Entertainment Virtual Reality Downloads Politics Professional Services Emails Bluetooth Streaming Media Automobile Co-managed IT Gaming Console Chromebook User Error Read Fraud Tactics Fileless Malware Hybrid Cloud Google Calendar Deep Learning Debate Devices Messenger Tracking Domains Tip of the week Webinar Work/Life Balance Harddrive Proxy Server Azure VoIP GPS UTM Content Rental Service Public Speaking Modem Strategy Touchscreen News Visible Light Communication Knowledge Device Management IT Plan Enterprise Resource Planning Web Server Shortcut Term Managed Services Provider Consultation IT consulting External Harddrive Legislation Error Cabling Electronic Medical Records Transportation Content Management email scam Addiction Administrator Entrepreneur Directions Display Technology Tips Business Managemenet Accountants A.I. Books Workers Troubleshooting Recording Environment Dark Web Free Resource Audit CIO 3D Ebay Supercomputer HIPAA SSID How To Fake News Advertising Flash Thin CLient Employee/Employer Relationship Staffing Google Wallet online Currency Migration Connected Devices Competition Processing Managed Services Data Warehousing Best Practives Windows XP Smart Phones Wireless Headphones Worker Electronic Payment Health IT Network Management Wasting Time Access Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Emergency Hard Drive Disposal Society G Suite Bookmark Computer Care Microserver Micrsooft LinkedIn Adminstration Pirating Information Device security MSP Employer Employee Relationship IP Address Cyber security Microsoft Excel Leadership Employer/Employee Relationships Drones Desktop Finance Hacks Physical Security Application Google Play Telephone Service Google Drive Windows Server 2008 Nanotechnology Social Network Human Resources Archive Business Cards Service Level Agreement Banking Botnet Managing Costs Spyware Mobile Payment Get More Done Skype Startup Asset Tracking Relocation Tablets Microsoft 365 Backup and Disaster Recovery Sync Browsers Electricity Printing Turn Key Username Medical IT Trend Micro Printer Server Permissions Language Unified Threat Management User Tip Proactive Maintenance Gamification Notifications CCTV Digital Signature Security Cameras Threats Trojan Point of Contact Screen Reader Customer Resource management Organize Music Upselling Piracy Upload Business Metrics Computer Malfunction Navigation Virtual Machine cache Television switches Writing Smart Tech Reliable Computing Solutions Fiber-Optic Database In Internet of Things Data Analysis Employees WannaCry Upgrades Video Surveillance HTML eCommerce PDF SQL Server Corporate Profile Recycling Mobile Security GDPR Managing Risk Time Management Freedom of Information LiFi Analytic Saving ZTime Telephone System Software License Trends Motion Sickness Best Available Keyboard Tech Hypervisor Assessment SharePoint Product Reviews Multi-Factor Security Cost Scalability Integration CrashOverride Regulation 3D Printing Capital Personal Information Productuvuty Financial Printers Managing Stress

toner1