Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Two-Factor Authentication Frequently Asked Questions

Two-Factor Authentication Frequently Asked Questions

Data security has to be a core consideration of the modern business, so every small effort you can take to protect your business is important. One such effort is the implementation of two-factor authentication. However, your employees may not initially feel entirely comfortable with some facets of two-factor authentication.

The two-factor authentication platform, adds a valuable layer of security to your existing solutions by requiring an additional credential beyond just your typical username and password. This can be a PIN that is generated by an application or even a physical token like a key fob that provides access.

To make a long story short, your employees may not feel entirely comfortable with your organization requiring them to keep an application on their phone as they may value the autonomy they have over what they do and don’t keep on their personal device. As a result, they are bound to have questions that you will need to answer.

To assist you with this, we’ve compiled a few questions you may have to field, and how to answer them truthfully and diplomatically if you choose to implement two-factor authentication for your business.

What is it?
Two-factor authentication is another way to improve data security and prevent threats from infiltrating business network’s access points. Picture your network as a house that your data lives in, with the front door being the access point. The lock that you find in the doorknob is your usual access credentials, username and password. 2FA adds a deadbolt to that door.

In other words, 2FA is the added security that can keep many threats out, at the cost of a tiny bit of convenience.

Why do I have to do this?
This line of questioning is indicative that an employee is resistant to change--unfortunately, information technology is built on change. Threats to a business’ security are always improving so they have the best chance of creating the most impact. To counter this, a business must acknowledge the risks inherent in powerful technology platforms and do everything they can to control access to their network. 2FA is just one of many ways to do that.

It is also important to remember that a chain is only as strong as its weakest link, so the entire business could be made vulnerable if one person doesn’t have the same dedication to organizational network security as the rest of the team. By implementing 2FA as a team, the business is better protected by the team.

Why do I have to do it on my personal phone?
This answer has two parts to it, one being of best interest to the business, the other being for the employee’s benefit. First off, economics. Does your business have the capital to spare to distribute mobile devices for the singular purpose of enacting 2FA? Typically, this isn’t the case.

Furthermore, which device is an employee more likely to favor? Their personal device that they have conditioned themselves into bringing everywhere, or the new, unfamiliar device they were just given for work?

What happens if I lose or forget my phone?
There are ways to get around a forgotten or misplaced device. In many cases, an organization can adjust an employee’s 2FA settings to allow them access via a new 2FA code, but this will require the employee to change their credentials. If the phone is lost, the company is still safe, as the Mobile Device Management platform that the 2FA implementation was likely part of will allow network administrators the requisite authority to handle the situation.

Can you see my personal stuff?
This question will likely come up. You should ensure your employees that the privacy of their personal data will not be betrayed, and that the authenticator will only be used to access their company materials.

Information can be a touchy subject, and its security is of paramount importance. Reach out to us at Eclipse Integrated Systems for more help with your company’s data security.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Hackers Software Malware Google Business Computing Internet Microsoft Business Management Windows 10 Computer User Tips Backup Hosted Solutions Network Security Innovation Business Productivity Productivity Windows Hardware Email Smartphone Apps Cybersecurity Disaster Recovery Law Enforcement Cybercrime Small Business Business Continuity Mobile Devices Managed IT Services IT Support VoIP Virtualization Efficiency Microsoft Office Office 365 Quick Tips communications Chrome Data Backup Browser Telephone Systems Miscellaneous Ransomware Holiday Money Android Operating System Mobility Outsourced IT Server Saving Money Application Communication Collaboration Password Data Recovery Smartphones Wireless Best Practice IT Services Workplace Tips Social Gadgets App Government Mobile Device Management Health Cloud Computing Information Technology Passwords Unsupported Software Google Drive Managed IT Facebook Current Events Computers Windows 10 BDR Vulnerability Shortcut User Error Hacking Risk Management Identity Theft Save Money Data Security Work/Life Balance Office tips Social Media Phishing USB Wi-Fi Alert Managed Service Provider Upgrade Data Management Politics Cost Management Private Cloud Battery Sports HaaS Save Time Recovery Going Green Update Automation Apple Commerce Personal Information Spam Automobile eWaste Transportation WiFi Internet Exlporer Streaming Media Wireless Technology Bandwidth Data Storage Excel OneNote Encryption Samsung Television VPN Humor Telephony Managed IT Services Remote Computing Users Audit Employer-Employee Relationship Meetings Google Docs iPhone Computer Care Artificial Intelligence Hosted Solution DDoS Mobile Computing Search Antivirus The Internet of Things Two-factor Authentication Flexibility Office Cleaning History IT Support Cortana End of Support Proactive IT Root Cause Analysis Tablets How To Employer Employee Relationship Gmail Access Legislation Experience WIndows Server 2008 Data Wearable Technology Wireless Charging Solid State Drive Augmented Reality NFL Computer Accessories Point of Sale Comparison SaaS Advertising Phone System Patch Management Hacker Tech Support Data Breach Hard Disk Drive Word Reputation Files Specifications Unified Threat Management Music Outlook Keyboard Laptop Running Cable Evernote SharePoint Windows Ink Black Market Vendor Management Social Engineering Robot Sales Upgrades Cast Analytics Touchpad Networking Google Maps PDF Big Data Screen Mirroring Retail Consultant BYOD iOS Sync Hiring/Firing Workers Teamwork Data Loss Instant Messaging Training Worker Commute Text Messaging Books Conferencing Touchscreen Updates Benefits Operating Sysytem Uninterrupted Power Supply Budget Settings Managing Stress Company Culture HBO Electronic Medical Records Gifts Microsoft Word Computer Fan Adobe Video Games Smart Technology Avoiding Downtime Internet of Things Chromecast Microsoft Excel Data Protection Credit Cards Emails Maintenance WannaCry Applications Legal File Sharing Trending IT Management Lithium-ion battery Webinar Licensing Virtual Reality Distributed Denial of Service Bluetooth Network Storage Entertainment IT Solutions Router Data storage Marketing FAQ IT solutions Nanotechnology Travel Scalability Scam Education Fax Server Administrator Mobile Device Charger Windows 10s Spyware CrashOverride Relocation Cache Safety Remote Monitoring Emergency Device Security Monitors Disaster Devices Worker

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login