Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Start Using Two-Factor Authentication Everywhere, Today

Start Using Two-Factor Authentication Everywhere, Today

It can be easy to slack off when it comes to good password practices. Many users still use the same password across multiple sites and often don’t use secure passwords. Password managers make this a lot easier, but it’s really two-factor authentication (2FA) that can make all the difference. Strong, unique passwords are still important (not all accounts offer two-factor authentication) but let’s talk about why you should always enable two-factor or multifactor on all of your accounts when possible.

Getting into my programs or logged onto different websites has been easy enough by using a password management tool, especially since there are settings that can be enabled to remember a specific device. When logging on from a different device, my phone or email is immediately hit with a notification. It’s a PIN, and without the PIN there is virtually no chance of logging in. This might be annoying if my phone isn’t on me and I’m sent a text notification, but let’s be honest, I don’t go anywhere without my phone, it’s my most valuable tool. 

So, you might have tried 2FA before or you might have been endlessly hitting the “ask me later” option that you are prompted with on new software that implemented the additional authentication measures. Whether you decide to use it or not there is one indisputable statement regarding this feature: two-factor authentication makes your accounts more secure. 

What Is Two-Factor Authentication

Even if you haven’t used 2FA, you’ve probably seen it in action. In fact, many sites, like bank accounts, Google, and Facebook might force a type of 2FA on you. If you’ve ever logged into a website from a different computer and then received an email or notification on your phone that a login from an unknown location just happened - that’s two-factor authentication. Albeit, it’s the reactive version that doesn’t do much to prevent others from gaining access to your information. Let’s not rely on being reactive, and look at true two-factor authentication.

By definition, two-factor or multi-factor authentication is an authentication method in which a computer user is granted access only after successfully presenting two pieces of evidence to an authentication mechanism: knowledge, and possession.

Knowledge: This is your password. You’ve memorized it or stored it securely in a password manager. The idea is that only you know it or have access to that information. In events where you don’t know your password, some sites might also accept your full email address or phone number in order to reset your password.

Possession: This is something that you own and almost always have in your possession. This is typically your smartphone, but other methods might have you carrying around a USB thumb drive or an electronic key that generates a random number.

The instantaneous code that is sent provides one more feature. It acts as an informant. If somebody were to log into one of my accounts with my password, I would find out instantly. Even then, they wouldn’t be able to get the PIN from my text message or authenticator app to finish the login process. This tells me I should change my password immediately, but otherwise my account should be safe.

Don’t Assume You are Safe

Enabling two-factor authentication won’t entirely protect you from threats or breaches. If you have two-factor set up on Facebook, Facebook can still get breached and passwords could be stolen. We see this happen all the time, with high profile attacks on large online entities stealing millions of records in a shot.

Following the other password best practices, like using strong passwords and never using the same password on two accounts is critical.

Recently, we saw the launch of Disney+, and it was reported that several thousand users had their brand-new accounts hijacked within hours of the launch of the service. This wasn’t because Disney was hacked; hackers just attempted to log in to steal accounts with emails and passwords they already had from some other data breach. 

Phishing attacks are plaguing millions of inboxes every single day. These attacks replicate the website in which they are impersonating, with a realistic login screen. Users are tricked to go there, fill in their information, and the credentials are directly sent to the cybercriminals.

As previously mentioned, 2FA isn’t the fix-all to cybersecurity. It does however put one more step between you and an ill-willed cybercriminal. Voyage Technology has many more tips to help your business become more secure. If you would like to talk to one of our experts, give us a call at 800.618.9844. 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 20 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Internet Hardware Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Hosted Solutions Collaboration IT Services Users Mobile Device Ransomware Quick Tips Workplace Strategy Microsoft Cybersecurity Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Android Business Management VoIP Smartphones communications Upgrade Mobile Devices Managed Service Disaster Recovery Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Remote Tech Term Network Internet of Things Productivity Automation Artificial Intelligence Facebook Current Events Cloud Computing Covid-19 Gadgets Server Remote Work Managed Service Provider Miscellaneous AI Information Holiday Outsourced IT Employee/Employer Relationship Spam Encryption Office Windows 10 Compliance Government Training Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Bandwidth Virtualization Mobile Office Two-factor Authentication Apps Data Security BYOD Vendor Mobile Device Management Chrome Gmail Budget Managed Services Voice over Internet Protocol Apple Networking Employer-Employee Relationship App Hacker Computing Avoiding Downtime Information Technology Applications Marketing Access Control Office 365 IT Support Tip of the week Conferencing WiFi How To BDR Operating System Computers HIPAA Router Risk Management Website Virtual Private Network Health Analytics Office Tips Help Desk Augmented Reality Storage Retail Password Big Data Healthcare Bring Your Own Device Managed IT Services Customer Service Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Cybercrime Vendor Management Solutions Physical Security Display Printer Paperless Office Windows 11 Infrastructure 2FA Firewall Monitoring Excel Document Management The Internet of Things Remote Workers Telephone Social Scam Data loss Cooperation Free Resource Project Management Windows 7 Going Green Robot Mobility Telephone System Settings Multi-Factor Authentication Cost Management Wireless Hacking Printing Content Filtering Presentation YouTube IT Management Wireless Technology Cryptocurrency VPN Employees Meetings Integration User Tip Modem Processor Virtual Desktop Computer Repair Mobile Security Data storage Word LiFi Holidays Outlook Data Storage Smart Technology Supply Chain Video Conferencing Money Humor Machine Learning Managed Services Provider Virtual Machines Safety Professional Services Saving Time Managed IT Service Sports Maintenance Mouse Downloads Antivirus iPhone Administration Licensing Vulnerabilities Entertainment Data Privacy Customer Relationship Management Images 101 Legislation Shortcuts Alt Codes Organization Travel Social Networking Downtime Google Maps Smart Devices Ransmoware Techology Fileless Malware Digital Security Cameras Hosted Solution Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive User Typing Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Google Drive Knowledge Wasting Time Threats IP Address Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service 5G Fraud Meta User Error Microchip Google Docs Unified Communications Username Experience Managing Costs Amazon Black Friday SSID Recovery Bitcoin Running Cable Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Hard Drives Google Wallet Network Management Tech Support IT Technicians Virtual Machine Environment Domains Media Cookies Monitors Cyber Monday Medical IT Windows 8 Proxy Server Reviews Laptop Tactics Development Hotspot Transportation Small Businesses Refrigeration Drones Websites Mirgation Hypervisor Displays Public Speaking Nanotechnology Optimization Lithium-ion battery PowerPoint Shopping Halloween SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Entrepreneur Navigation Management PCI DSS Chatbots Screen Reader Writing Distributed Denial of Service Workplace Hacks Lenovo Gig Economy Scary Stories Service Level Agreement Internet Service Provider Fun Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Undo Evernote Paperless Deep Learning Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Superfish Bookmark Education Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Financial Data Error History Connectivity IT Social Engineering Break Fix Scams Application Mobile Computing Browsers Smartwatch Upload Procurement Search Remote Computing Azure Hybrid Work IBM Multi-Factor Security Tech Human Resources Best Practice Social Network Telework Cyber security Buisness Tablet IoT Communitications Dark Web Cables CES Legal IT solutions Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Business Growth Managed IT Customer Resource management FinTech File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Cortana Notifications Staff Value Business Intelligence Competition

Blog Archive