2-Factor Authentication – Why does it matter?

Cybercrime is on the rise!

  • Simple and/or outdated security systems are no match for modern threats and attacks.
  • For companies dealing with sensitive data, such as health care organisations, loss of data represents a breach of GDPR, which can have devastating consequences.
  • Unfortunately, it is often the users who are targeted, with their log in details being compromised.
  • Companies should be employing a higher level of protection than usernames and passwords. For many, that extra level of security is two-factor authentication.

2FA - How does it work?

2FA is an extra layer of security used to make sure that people trying to gain access to an online account are who they say they are. First, a user will enter their username and a password. Then, instead of immediately gaining access, they will be required to provide another piece of information. This second factor could come from one of the following categories:

  • Something you know: This could be a personal identification number (PIN), a password, answers to “secret questions” or a specific keystroke pattern
  • Something you have: Typically, a user would have something in their possession, like a credit card, a smartphone, or a small hardware token
  • Something you are: This category is a little more advanced, and might include biometric pattern of a fingerprint, an iris scan, or a voice print

With 2FA, a potential compromise of just one of these factors won’t unlock the account. So, even if your password is stolen or your phone is lost, the chances of someone else having your second-factor information is highly unlikely. Looking at it from another angle, if a consumer uses 2FA correctly, websites and apps can be more confident of the user’s identity, and unlock the account.

For Further Information or advice, please contact the Magikos IT Team or fill in the form below and we will contact you.

Tel: 01344 204019
Email: info@magikos.co.uk

Supplying IT | Building IT | Hosting IT | Supporting IT | Managing IT | Auditing IT | Disposing of IT