Passwords Aren't Enough: Exploring Multi-factor Authentication As A Part of Your Cybersecurity Strategy
Author: Keoni Kepner
In the early days of the internet, all you needed to log into an account or website was a username and a short, simple password. Today, we know that passwords are usually not secure and can easily be cracked, spoofed, and stolen. With just your password a hacker can steal your personal information. This can be any information from your email address, to your social security number, banking account or credit card numbers. Business data is just as easy, if not easier, to get hacked due to staff using simple passwords, writing them down, or even sharing with co-workers.
It's not just computers that make us vulnerable. Almost 3 billion people have smartphones. Unfortunately, smartphones and tablets are also at risk when it comes to data breaches and hacks. Cell phones and tablets are just as susceptible to malware and viruses as computers, and may even be more so. Unsecured Wi-Fi connections, malicious websites, and phishing emails and texts are all avenues by which hackers can steal your data. Applications and other downloads can inject viruses into your smart device and those viruses can compromise not only your personal data, but business and client information as well.
Two-factor authentication (2FA) and multi-factor authentication (MFA) are methods created to add security to passwords. These approaches strengthen login credentials so that hackers need more than just a password to access your information. Some two-factor authentication and multi-factor authentication methods include:
- Single-use email links
- Codes sent via text message
- Magnetic Striped Card
- Security Keys
- Security tokens / Mobile Devices
- Challenge / Response
- Voice recognition
Your IT staff can’t stand over everyone’s shoulder as when password setup occurs. Sure, you can add in minimum character length, and require special characters, but how do you ensure employees don't share or write down passwords? Since you can’t do that, what solutions do you have to protect your company's data and systems?
Two-factor authentication (2FA) and multi-factor authentication (MFA) are the most effective means of combating account takeover attempts that result from social engineering campaigns. NXTsoft offers a multi-factor authentication (MFA) solution included in our managed service solution that includes installation, management and support. The compliance arm of our ThreatAdvice vCISO
solution can assess your MFA needs, and provided a customized solution that fits your company. Let us help you take the extra step to protect your assets. Contact NXTsoft
now for more information on a multi-factor authentication solution!
July 08, 2019