Why you need to use two-factor authentication

Extra Security
Extra Security

Think your company’s computers are protected with standard passwords? Guess again. Too many of your staff depend upon simple passwords that are easy for hackers to figure out. Others use the same password for multiple Web sites, computers and mobile devices. Consequently once cyber criminals hack that password, they are able to easily gain access to numerous other sites and devices. This is exactly why a recent story by Biztech Magazine identifies two-factor authentication as a increasing trend among companies that take cyber security seriously.

Why a second step matters

The best way to prevent cyber crimes is to make hacking more of a challenge. This is exactly why, according to Biztech Magazine, two-factor authentication works so well. First, a worker must enter a password. But to gain access to their machines or Web sites, workers also have to follow up with a second action. They may need to use a biometric identifier to get into a particularly sensitive Web site. Or, they may have to swipe a smart code or insert a token to log onto a computer. By adding a second step, your business will dissuade the vast majority of hackers.

Rolling it out

Not all of your employees, though, will be happy about two-factor authentication. It takes more effort on their part, naturally. But Biztech offers a few recommendations for smoothing this rollout. First, the magazine suggests you select a second factor that will result in the least disruption among employees. As an example, Biztech uses the example of smart cards. Mobile devices such as smartphones are usually not compatible with these cards. That could be deal breaker for some organizations. Businesses that have staff that work from a wide range of locations might not do well with physical tokens.

Take your time

Give your staff time to get accustomed to the concept of two-factor authentication before you officially launch it. You ought to give your workers the chance to ask questions about how the process works. This also gives you a chance to explain just why two-step authentication is necessary and how it can provide better protection to the company.

***

(Image Credit – Bing Images )

Acumor delivers proactive maintenance services through our flat-rate IT Support Service. Designed to reduce your costs, increase your profits and mitigate your business risks, we partner with you as your Virtual CIO and IT Department, allowing you to focus on running your business, not your technology.