croom new

Two-Factor Authentication Frequently Asked Questions

Two-Factor Authentication Frequently Asked Questions

Data security has to be a core consideration of the modern business, so every small effort you can take to protect your business is important. One such effort is the implementation of two-factor authentication. However, your employees may not initially feel entirely comfortable with some facets of two-factor authentication.

The two-factor authentication platform, adds a valuable layer of security to your existing solutions by requiring an additional credential beyond just your typical username and password. This can be a PIN that is generated by an application or even a physical token like a key fob that provides access.

To make a long story short, your employees may not feel entirely comfortable with your organization requiring them to keep an application on their phone as they may value the autonomy they have over what they do and don’t keep on their personal device. As a result, they are bound to have questions that you will need to answer.

To assist you with this, we’ve compiled a few questions you may have to field, and how to answer them truthfully and diplomatically if you choose to implement two-factor authentication for your business.

What is it?
Two-factor authentication is another way to improve data security and prevent threats from infiltrating business network’s access points. Picture your network as a house that your data lives in, with the front door being the access point. The lock that you find in the doorknob is your usual access credentials, username and password. 2FA adds a deadbolt to that door.

In other words, 2FA is the added security that can keep many threats out, at the cost of a tiny bit of convenience.

Why do I have to do this?
This line of questioning is indicative that an employee is resistant to change--unfortunately, information technology is built on change. Threats to a business’ security are always improving so they have the best chance of creating the most impact. To counter this, a business must acknowledge the risks inherent in powerful technology platforms and do everything they can to control access to their network. 2FA is just one of many ways to do that.

It is also important to remember that a chain is only as strong as its weakest link, so the entire business could be made vulnerable if one person doesn’t have the same dedication to organizational network security as the rest of the team. By implementing 2FA as a team, the business is better protected by the team.

Why do I have to do it on my personal phone?
This answer has two parts to it, one being of best interest to the business, the other being for the employee’s benefit. First off, economics. Does your business have the capital to spare to distribute mobile devices for the singular purpose of enacting 2FA? Typically, this isn’t the case.

Furthermore, which device is an employee more likely to favor? Their personal device that they have conditioned themselves into bringing everywhere, or the new, unfamiliar device they were just given for work?

What happens if I lose or forget my phone?
There are ways to get around a forgotten or misplaced device. In many cases, an organization can adjust an employee’s 2FA settings to allow them access via a new 2FA code, but this will require the employee to change their credentials. If the phone is lost, the company is still safe, as the Mobile Device Management platform that the 2FA implementation was likely part of will allow network administrators the requisite authority to handle the situation.

Can you see my personal stuff?
This question will likely come up. You should ensure your employees that the privacy of their personal data will not be betrayed, and that the authenticator will only be used to access their company materials.

Information can be a touchy subject, and its security is of paramount importance. Reach out to us at Eclipse Integrated Systems for more help with your company’s data security.

Wireless Charging Is Catching On
Tip of the Week: Syncing Email Across Multiple Dev...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Business Computing Network Security Hackers Internet Google Business Management Malware Software Microsoft Computer Innovation Windows 10 Backup Hosted Solutions Productivity User Tips Tech Term Productivity Cybersecurity Business Apps Email Windows Mobile Devices Managed IT Services Cybercrime Smartphone Hardware Efficiency Operating System Saving Money Virtualization Browser Internet of Things Law Enforcement Small Business Smartphones Disaster Recovery communications VoIP IT Support Collaboration Data Security Data Backup Ransomware Business Continuity Data Recovery Android Chrome Mobility Microsoft Office Mobile Device Management Telephone Systems Communication IT Support Server Miscellaneous Passwords Office 365 Holiday Phishing Wireless Workplace Tips Quick Tips Money Data Vulnerability Social Media Government Unsupported Software Network Application App Information Technology Wi-Fi Update Cloud Computing Health Outsourced IT Password Risk Management BDR Best Practice Gadgets IT Services Google Drive Cost Management Social Employer-Employee Relationship Shortcut Two-factor Authentication Work/Life Balance Facebook Current Events Alert Office tips USB Managed IT Computers Streaming Media Artificial Intelligence Antivirus Hacking Upgrade User Error Data Management Spam Identity Theft Save Money Patch Management Windows 10 Users Sports Managed Service Provider Politics Recovery Meetings Office End of Support Battery Going Green Cleaning Private Cloud Apple Samsung OneNote Automation Tech Support Gmail Excel Networking iPhone Managing Stress HaaS eWaste WiFi Managed IT Services Mobile Computing Transportation DDoS Devices Internet Exlporer Cortana Automobile Audit Wireless Technology Proactive IT Personal Information The Internet of Things Save Time Mobile Security Bandwidth Company Culture Hosted Solution Legal Television Google Docs Blockchain Search Wireless Charging Commerce Fraud Computer Care VPN Telephony Flexibility Humor Data Storage Social Engineering Encryption Data Protection Router Remote Computing History Maintenance Managed IT Service Books File Sharing Language Budget Wearable Technology Outlook Evernote Upgrades Windows Ink Ciminal Hard Drive Instant Messaging IT Management RAM Experience IT solutions Computing How To Avoiding Downtime Cast Sales Trends Text Messaging Licensing Device Security Cables Storage Scam Nanotechnology Internet Explorer Chromecast Point of Sale Consultant Google Maps Project Management Hiring/Firing iOS Chromebook Files IT Solutions FAQ Mobile Device Microsoft Teams Phone System Windows 10s App store BYOD Retail Training A.I. Travel Virus Voice over Internet Protocol Video Games Laptop Employer Employee Relationship Root Cause Analysis Threat Advertising Running Cable Sync Workers Touchscreen Data Loss IT budget Benefits Printing Charger G Suite SharePoint Music Spyware Solid State Drive Reputation Conferencing Settings Movies Bluetooth Robot Distributed Denial of Service Tablets Proactive Information Touchpad Legislation Computer Accessories Augmented Reality PowerPoint Updates Electronic Medical Records Analytics Smart Technology Computer Fan Google Assistant Trending Marketing Virtual Reality WIndows Server 2008 SaaS Bring Your Own Device Data storage NFL Hacker Hard Disk Drive Identity Black Market HBO Gifts Business Intelligence Lithium-ion battery Fax Server Entertainment Emails Websites Amazon Comparison Connectivity Administrator Adobe Microsoft Word Safety Teamwork Big Data Microsoft Excel Identities WannaCry Value Education Data Breach Unified Threat Management Hybrid Cloud Word Edge Keyboard Data Privacy Credit Cards Unified Communications Webinar Data Theft Virtual Assistant Uninterrupted Power Supply Scalability Operating Sysytem Screen Mirroring Specifications Vendor Management Downloads PDF Access Worker Commute Applications Monitors Twitter Relocation Plug-In Worker Remote Monitoring and Management Disaster Cache Remote Monitoring Emergency CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login