SMART Blog

Smart Services has been providing independent agents with proactive, fast, and expert technology services since 1991.

Two-Factor Authentication Frequently Asked Questions

Two-Factor Authentication Frequently Asked Questions

Data security is such a core consideration of the modern business that every small effort you can take to protect your business is important. One such effort is the implementation of two-factor authentication. However, your employees may not initially feel entirely comfortable with some facets of two-factor authentication.

The two-factor authentication platform adds a valuable layer of security to your existing solutions by requiring an additional credential beyond just your typical username and password. This can be a PIN that is generated by an application or even a physical token like a key fob that provides access.

To make a long story short, your employees may not feel entirely comfortable with your organization requiring them to keep an application on their phone as they may value the autonomy they have over what they do and don’t keep on their personal device. As a result, they are bound to have questions that you will need to answer.

To assist you with this, we’ve compiled a few questions you may have to field, and how to answer them truthfully and diplomatically if you choose to implement two-factor authentication for your business.

What is it?
Two-factor authentication is another way to improve data security and prevent threats from infiltrating business network’s access points. Picture your network as a house that your data lives in, with the front door being the access point. The lock on your doorknob is your usual access credentials, username and password. 2FA adds a deadbolt to that door.

In other words, 2FA is the added security that can keep many threats out, at the cost of a tiny bit of convenience.

Why do I have to do this?
This line of questioning is indicative that an employee is resistant to change--unfortunately, information technology is built on change. Threats to a business’ security are always improving so they have the best chance of creating the most impact. To counter this, a business must acknowledge the risks inherent in powerful technology platforms and do everything they can to control access to their network. 2FA is just one of many ways to do that.

It is also important to remember that a chain is only as strong as its weakest link, so the entire business could be made vulnerable if one person doesn’t have the same dedication to organizational network security as the rest of the team. By implementing 2FA as a team, the business is better protected by the team.

Why do I have to do it on my personal phone?
This answer has two parts to it, one in the best interest to the business, the other being for the employee’s benefit. First off, economics. Does your business have the capital to spare to distribute mobile devices for the singular purpose of enacting 2FA? Typically, this isn’t the case.

Furthermore, which device is an employee more likely to favor? Their personal device that they have conditioned themselves into bringing everywhere, or the new, unfamiliar device they were just given for work?

What happens if I lose or forget my phone?
There are ways to get around a forgotten or misplaced device. In many cases, an organization can adjust an employee’s 2FA settings to allow them access via a new 2FA code, but this will require the employee to change their credentials. If the phone is lost, the company is still safe, as the Mobile Device Management platform that the 2FA implementation was likely part of will allow network administrators the requisite authority to handle the situation.

Can you see my personal stuff?
This question will likely come up. You should ensure your employees that the privacy of their personal data will not be betrayed, and that the authenticator will only be used to access their company materials.

Information can be a touchy subject, and its security is of paramount importance. Reach out to us at SMART Services for more help with your company’s data security.

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 25 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 24 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Data Recovery Productivity Education video App Social Engineering Lifestyle Travel Windows 10 Mobile Device robot Near Field Communication Workers Running Cable iPad Apple Language PDF Media Consumption WiFi Net Neutrality Phone System Vulnerability Hacking WannaCry Best Available Backup Proactive Co-managed IT Inbound Marketing Virtual Reality Windows Hardware Marketing Streaming Media Training Wiring Root Cause Analysis Solid State Drive Unified Threat Management Blockchain Mobile Computing Mobility Administrator Users Managed Service Provider IT Consultant Benefits Mircrosoft webinar Books email encryption Regulation Phishing Scam iPhone Password Ransomware Administration Network Security Going Green Fax Server HaaS Credit Cards Router Jessica Stevenson Phishing PowerPoint Save Time Current Events Smartphone ISP Keyboard Alert Information Technology Disaster Recovery Software as a Service Passwords Gifts Avoid Downtime Document Management Email Maintenance Upgrades Emergency Managed IT Services WIndows Server 2008 Transportation Bandwidth communications Computer HIPAA CrashOverride Microblogging User Legal Debate Legislation Domains Gmail SMART Services Charger Augmented Reality Cloud Video Games IIAI Cloud Computing Personal Information End of Support Upgrade Comparison BDR Hard Drive Google Docs Compliance Wireless Hetrick and Associates Bryant Caudill Mobile Devices Thank You Cleaning Television Best Practices SharePoint Data Security Entertainment IT Support Chrome Wearable Technology MSP Applications Branding Scam Video Surveillance Managing Stress Webinar Distributed Denial of Service Social Wi-Fi Microsoft Display Office Tips Saving Money DocStar Youtube Networking GLAD Business Computing Humor Laptop Wireless Charging Telephony Social Networking Application Emails File Sharing Presentation Programming Employer-Employee Relationship Spyware iOS Computer Fan IoT Nokia Data Breach Company Culture Microsoft Outlook Risk Management Apps Automobile Hard Disk Drive press release Remote Computing Bluetooth Operating System Smartphones Settings Private Cloud Identity Antivirus Files The Internet of Things WIndows 7 Point of Sale Help Desk Amazon OneNote Updates Holiday Fraud Data Loss USB ebay Collaboration Screen Mirroring Microsoft Outlook 2007 agency automation Experience Prodcutivity IT Support Access Data Backup Audit Windows 10s Specifications eWaste Windows Ink Websites Bloatware Facebook Cybersecurity Computer repair Excel Google Drive In the News Doug Vanni Sync Internet of Things Computers Managed IT Service Network Congestion Virus Mobile Office Outsourced IT Data Mobile Device Management website Data Protection Business Intelligence Images Law Enforcement Software Devices MySalesResults Content Filtering hackers MAIA Telephone Systems Scott White Unsupported Software Artificial Intelligence Virtualization DDoS Cast How To Word Hosted Solution Instant Messaging Small Business Wayne Joubert Employer Employee Relationship Proactive IT Data Management Network Cost Management Cybercrime VPN History Recovery Android Reliable Computing Mobile Security Two-factor Authentication Congratulations HBO Outlook Quick Tips BYOD Microsoft Word Work Station Back Up Paperless Office Internet IT Service Remote Monitoring Windows 8 Jerry Fetty Computing Technology Ubuntu Printer Server Encryption Take Your Agency to the Next Level Save Money Tech Tip Server Taxes Conferencing Bring Your Own Device Retail Data Privacy Science Reputation Edge Regulations data backups Data Theft Miscellaneous Extreme Technology Makeover Hosted Solutions Data Storage Project Management IT Technicians Value Best Practice Lithium-ion battery Black Market Internet Exlporer Office 365 holidays SaaS insurance Consultant Tech Term automation Supercomputer Intranet Wireless Technology Steve Anderson Kleinschmidt Insurance Update Avoiding Downtime Chromecast Dark Web Cameras Managed IT Hiring/Firing Blogging Gift Giving Analysis Tablet Touchpad 3D Printing IT Services Privacy Hard Drives Device Security Computer Care Innovation Microsoft Windows 7 Cortana Managed IT Services IT Budget IT consulting HITECH Act Business Management Business Continuity Analytics Identity Theft Shadow IT Music Professional Services Storage Samsung Meetings Search Flexibility User Tips Text Messaging Fun Safety Redundancy Budget hacker Big Data Firewall Licensing Sports Mouse IT solutions Google Maps Google Work/Life Balance VoIP SMARTweb Defense Electronic Medical Records lunch and learn Virtual Desktop Vendor Management Biometrics Patch Management Applied TAM Twitter IT Management Adobe Operating Sysytem Productivity Ciminal FAQ Workplace Tips Customer Relationship Management Printer Nanotechnology malware Microsoft Office OneDrive Money Shortcut User Error Health Uninterrupted Power Supply Backkup Tech Support Mobile Politics spam App store Security Buisness Browser Computer Accessories Business Efficiency Windows 10 Human Resources Government Gadgets Microsoft Excel Online Currency Touchscreen Colocation Commerce NFL Evernote Customer Service Tip of the Week Surge Protector Microsoft Office 2010 Identities Worker Commute Saving Time Tablets Scalability IT Solutions Chevy HHR Office Smart Technology Web Design Battery Sales Advertising Tutorial Disaster Trending Teamwork social media Communication

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *