Everything You Need to Know About Multi-Factor Authentication

Everything You Need to Know About Multi-Factor Authentication

Imagine if no matter how well protected your computer systems are, there was yet another level of protection? One which involves specific factors particular to the user, which they can use in addition to a strong password? With multi-factor authentication (MFA), you have yet another defense against bad actors seeking to infiltrate your network. Read on to learn more about this relatively new technology. MFA: An Extra Layer of Protection Passwords used to be enough. However, with bad actors looking for—and finding—ways to get into your network, multi-factor authentication (MFA) is a technology that is gaining ground. The most common type of this validation is two-factor authentication, in which a second method (additional factor of verification) is used to validate your account. For example, using a password (one factor) and text message with a code (second factor). The use of two different factors enhances security the way a single factor can’t. These details are not ones a bad actor will know, so even if they access the system using your password, they cannot go any further. An introductory article from the National Institute of Standards and Technology (NIST) cites studies that indicate that users of MFA feel much more secure than with their passwords alone. Two-factor authentication is a subset of MFA and is adequate; using more than two factors provides even more protection.  Applications to Core Systems and the Cloud With technology continuing to grow, threats follow closely behind. How do you keep “bad actors” from accessing your network, the backbone of your IT infrastructure? Some attacks, like ransomware-as-a-service, allow a cyber criminal to simply log in to...
October is Cybersecurity Awareness Month: Be Aware and Prepared

October is Cybersecurity Awareness Month: Be Aware and Prepared

October is National Cybersecurity Awareness month, a “collaborative effort between government and industry to raise awareness about the importance of cybersecurity, and to ensure all businesses have the resources to be safer and more secure online.” This year, according to the US Department of Homeland Security, the emphasis is on a proactive approach. Read on to learn more about various aspects of cybersecurity. Develop Awareness of Current Security Threats The more technology advances and expands, the more places an attack can occur. Cybercriminals are growing more clever and resourceful, and know how to insert malware, or a bot that can mimic human activity. There are also phishing schemes, wherein an attacker can send an email persuading an unwitting employee to share confidential data. Weak spots in a network are subject to exploitation as well. Many companies, according to CompTIA, think that security is “good enough,” and haven’t yet dedicated much of their budget to maintaining cybersecurity. However, your business doesn’t have to be one of them. There are steps you can take, starting with an assessment of your network’s security. Take an Inventory of Current Protections What is your current level of security? Take stock of your business’s protection, starting with the computer network. Are there any weak spots or vulnerabilities needing to be patched? Make sure that you have the most current operating system patches. Also ensure that your antivirus and anti-malware definitions are current, to block attackers from infiltrating your system. Map all devices connected to your network, including ones operated by staff working remotely to make sure that those points are safe. Do your employees know...