croom new

Eclipse Integrated Systems Blog

Two-Factor Authentication Frequently Asked Questions

Two-Factor Authentication Frequently Asked Questions

Data security has to be a core consideration of the modern business, so every small effort you can take to protect your business is important. One such effort is the implementation of two-factor authentication. However, your employees may not initially feel entirely comfortable with some facets of two-factor authentication.

The two-factor authentication platform, adds a valuable layer of security to your existing solutions by requiring an additional credential beyond just your typical username and password. This can be a PIN that is generated by an application or even a physical token like a key fob that provides access.

To make a long story short, your employees may not feel entirely comfortable with your organization requiring them to keep an application on their phone as they may value the autonomy they have over what they do and don’t keep on their personal device. As a result, they are bound to have questions that you will need to answer.

To assist you with this, we’ve compiled a few questions you may have to field, and how to answer them truthfully and diplomatically if you choose to implement two-factor authentication for your business.

What is it?
Two-factor authentication is another way to improve data security and prevent threats from infiltrating business network’s access points. Picture your network as a house that your data lives in, with the front door being the access point. The lock that you find in the doorknob is your usual access credentials, username and password. 2FA adds a deadbolt to that door.

In other words, 2FA is the added security that can keep many threats out, at the cost of a tiny bit of convenience.

Why do I have to do this?
This line of questioning is indicative that an employee is resistant to change--unfortunately, information technology is built on change. Threats to a business’ security are always improving so they have the best chance of creating the most impact. To counter this, a business must acknowledge the risks inherent in powerful technology platforms and do everything they can to control access to their network. 2FA is just one of many ways to do that.

It is also important to remember that a chain is only as strong as its weakest link, so the entire business could be made vulnerable if one person doesn’t have the same dedication to organizational network security as the rest of the team. By implementing 2FA as a team, the business is better protected by the team.

Why do I have to do it on my personal phone?
This answer has two parts to it, one being of best interest to the business, the other being for the employee’s benefit. First off, economics. Does your business have the capital to spare to distribute mobile devices for the singular purpose of enacting 2FA? Typically, this isn’t the case.

Furthermore, which device is an employee more likely to favor? Their personal device that they have conditioned themselves into bringing everywhere, or the new, unfamiliar device they were just given for work?

What happens if I lose or forget my phone?
There are ways to get around a forgotten or misplaced device. In many cases, an organization can adjust an employee’s 2FA settings to allow them access via a new 2FA code, but this will require the employee to change their credentials. If the phone is lost, the company is still safe, as the Mobile Device Management platform that the 2FA implementation was likely part of will allow network administrators the requisite authority to handle the situation.

Can you see my personal stuff?
This question will likely come up. You should ensure your employees that the privacy of their personal data will not be betrayed, and that the authenticator will only be used to access their company materials.

Information can be a touchy subject, and its security is of paramount importance. Reach out to us at Eclipse Integrated Systems for more help with your company’s data security.

Wireless Charging Is Catching On
Tip of the Week: Syncing Email Across Multiple Dev...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, January 20 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Network Security Internet Google User Tips Hackers Malware Software Productivity Business Management Microsoft Tech Term Innovation Hosted Solutions Efficiency Computer Backup Browser Windows 10 Email Cybersecurity Business Apps Smartphones Productivity Mobile Devices Managed IT Services Smartphone Data Backup Internet of Things Small Business Data Recovery Windows Saving Money Hardware Communication Virtualization Cybercrime Holiday VoIP Android Collaboration Law Enforcement Passwords Workplace Tips Wireless communications Disaster Recovery Network Ransomware Mobile Device IT Support Microsoft Office Business Continuity Mobility Operating System Data Security Miscellaneous Cloud Computing IT Services Users Data IT Support Phishing Chrome Wi-Fi Server Office 365 BDR Windows 10 Update Gadgets Quick Tips Password Money Social Media Mobile Device Management Telephone Systems Outsourced IT Application Information Technology App Health Risk Management Unsupported Software Vulnerability Upgrade Cost Management Best Practice Employer-Employee Relationship Google Drive Government Social Automation Office tips Current Events Streaming Media Blockchain Information Spam Bandwidth USB Artificial Intelligence Antivirus Alert User Error Patch Management Managed Service Provider Marketing Computers Identity Theft Hacking Shortcut Two-factor Authentication Politics Data Management Networking Managed IT Services Save Money Sports Work/Life Balance Managed IT Facebook Proactive IT Medical IT HaaS WiFi iPhone Managing Stress Mobile Computing DDoS SaaS Commerce Mobile Security Automobile Wireless Charging Computer Care Tech Support Google Docs Gmail Personal Information Fraud Transportation Business Intelligence Data Storage Managed Service Television Connectivity Internet Exlporer Legal The Internet of Things Word Analytics Wireless Technology Search Data Protection Office Compliance Hosted Solution Applications Maintenance Outlook Flexibility Samsung OneNote Cleaning VPN Router Encryption Excel Meetings Telephony Humor History Storage Social Engineering End of Support Battery Going Green Training Remote Computing Devices Apple Touchscreen BYOD Private Cloud Cortana Audit Remote Monitoring and Management eWaste Company Culture Access Control Recovery Save Time Computer Accessories Printing Augmented Reality Tablets Phone System Spyware Electronic Medical Records G Suite Wearables Conferencing Updates Movies Eliminating Downtime Avoiding Downtime Legislation Running Cable Smart Technology Computer Fan Analysis Advertising WIndows Server 2008 SharePoint PowerPoint Authentication Video Games Hacker Proactive Hard Disk Drive Chromecast Distributed Denial of Service Google Assistant GDPR NFL Music Safety Emails Bring Your Own Device Files HBO Gifts Bluetooth Adobe Microsoft Word Unified Threat Management Wireless Internet Healthcare Reputation Comparison Identity WannaCry Data Breach Authorization Laptop Microsoft Excel Identities Keyboard Websites Amazon Fax Server Vendor Management Value Dark Web Edge Webinar Hybrid Cloud Virtual Reality Credit Cards Data Privacy Robot Entertainment Upgrades Unified Communications Help Desk Screen Mirroring Black Market Specifications Evernote Teamwork Downloads Touchpad File Sharing Language Data Theft Virtual Assistant Error Data storage Windows Ink Big Data Ciminal IT solutions Managed IT Service Trending IT Management Education Scam Hard Drive Nanotechnology Lithium-ion battery Licensing Device Security Consultant RAM Certification Cast Sales PDF Worker Commute Trends Troubleshooting Scalability Wearable Technology Hiring/Firing Computing iOS Plug-In Administrator IT Solutions FAQ Internet Explorer Microsoft Office 365 Google Maps Books Project Management Windows 10s Cables Employer Employee Relationship Chromebook Root Cause Analysis Reporting Travel Experience Microsoft Teams Security Cameras Instant Messaging Retail Access Text Messaging Sync Workers A.I. Profitability Uninterrupted Power Supply Operating Sysytem How To Benefits App store Point of Sale Charger Threat Settings Data Loss IT budget Virus Solid State Drive Voice over Internet Protocol Budget Cache Remote Monitoring CrashOverride Emergency Monitors Disaster Printers Twitter Regulation Worker Relocation

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login