Multi-factor authentication plays an essential role in data protection.
Bad press for the password
The password is often cited as one of the flimsiest forms of cyber-protection. Continually blamed for security breaches, loss of data, and viral attack, the password is no longer valued as a reliable security measure. In fact, evidence shows that breaking through security passwords is not that difficult.
But let’s remember where those passwords come from. Who made them? Who’s responsible for their quality?
That’s right. Us. The most common reason for cybersecurity breakdown is human error.
A good password is actually a very robust security measure. In the days when each of us might have had just a cashpoint PIN and an email password to remember, when we could be bothered to create a password that met all the requirements for security, these little fellas worked rather well. Nowadays, however, according to various sources, we each have up to 130 passwords to remember, and research shows that more than half of us use the same password for multiple accounts.
Anyway, it is what it is. If we need 100 passwords, we need 100 passwords. And if we can’t remember 100 unique and complex strings of characters without writing them down, duplicating, or sharing with others, we need to find a better way of protecting data.
Let’s talk about Multi-Factor Authentication. The definition is in the name, but what does Multi-Factor Authentication look like in practice?
These are some of the authentication factors that can be mixed and matched to prove your identity:
- Something physical that you have, for example an ID card or a dongle.
- Something that you know, like a PIN or password.
- Something that you are (a biometric), such as fingerprint or voice.
- A one-time code sent to a separate device – usually a smart phone.
- GPS tracking.
The more credentials required to access an account, the harder it is for a hacker to get through. If all you needed to withdraw money from a cashpoint was a bank card or a PIN, thieves would have an easier time. Imagine needing a bank card, a PIN, and a one-time code for each cash withdrawal. A thief would have to get hold of your card and your phone, and find out your PIN.
Fortify24/7 security packages provide multi-layer protection for your IT systems. We understand that with so many online accounts to access and protect, security processes have become overwhelming. Not only do we install the protective software, and monitor your system’s activity, we also deliver user training for your team, which goes a long way to stepping up your level of cybersecurity.
Article produced for and on behalf of Fortify247 Ltd by Hazel @ Folio Copywriting