It is clear that the “gate-keeping” to our networks needs a more robust answer. Enter the X-Factor… or rather Two-Factor Authentication.

What is it?
Most of you are already familiar with Two-Factor Authentication (2FA). Take for example people who do on-line banking. When doing this, have you ever tried to access your account from a different computer? You put in your proper login credentials and then you get a message that basically tells you, “Whoa, we are not sure that you are you, so we are going to send an authentication code to your phone to cover our …...”

Probably the first time this happened to you, you were a little surprised, or even annoyed, as it adds another few seconds to your usual login routine. Typically, you get the code quickly and you can get on with your business within a minute or two, making 2FA an added buffer that gives you an additional layer of security to protect you from cyber-thieves looking for your data. It protects your logins such as

those for your email, your phone system, your on-line banking and requires a second step whenever you are trying to access your information. Further thwarting the hacker, 2FA can protect your account even if you have been hacked, as it prevents the hacker from getting any further into your account, even if they have your username and your password.

The auto-generation of the security code is generated by an app that then sends the code to your phone, so that means that ONLY the person physically holding the phone (‘something in your hand’) and who has all the other login information (‘something in your head’) will have enough login details to access the account.

You can implement this security feature too!
If you add this feature to your network, here’s a brief overview for how it works when you try to login.
  1. Connect to your remote computer or remote session
  2. Type in your username and password as usual
  3. Proceed to the next step, which 'pauses' the login access
  4. Open the authenticator app on your mobile device or smart phone
  5. Type the security code you receive, or select “Allow” or “Deny” on your authentication app
  6. You are now logged in SECURELY
Not to worry, most browsers will keep you logged in long enough to go through the process.

Although 2FA isn’t new, it is certainly becoming more and more popular as a secondary measure to ensure your security. Remember that the more layers of security you deploy will greatly reduce the chances of a hacker hacking their way in to your system. Requiring multiple components to help confirm a user’s identity goes a long way to protecting your employees and your business

They say that an ounce of prevention is worth a pound of cure. Having 2FA is a security measure that savvy companies understand they need to implement. If you haven’t already added 2FA to your business security strategy, it’s certainly time to start!

Contact us today if you would like to learn more!

About Tech 2020 Solutions
Tech 2020 Solutions offers complete turnkey solutions for the technologies that drive your business, stores and secures your data and helps you communicate in and outside of your company. Offering multiple levels of on-site and remote support, monitoring and maintenance for your data, IT, phones, and peripheral equipment needs including general IT Support and Services, Cloud Storage and Applications, Network Security, Back Up, Mobile Solutions, VoIP Phone Systems, Unified Communications, Business Continuity, Disaster Recovery, Dark Web Monitoring, Phishing Training and Testing. Visit www.Tech2020solutions.com to learn more about Tech 2020 Solutions, or call 516-876-8761 or email info@Tech2020solutions.com.

Power Up with John Hassler is a blog distributed by Tech 2020 Solutions, and written by John Hassler, President and Founder of the company.  To reach John, contact him at 516.876.8761 or via email at news@Tech2020solutions.com.  Connect on Linked In and Facebook.