SMART Blog

Featured 

Two-Factor Authentication Frequently Asked Questions

Two-Factor Authentication Frequently Asked Questions

Data security is such a core consideration of the modern business that every small effort you can take to protect your business is important. One such effort is the implementation of two-factor authentication. However, your employees may not initially feel entirely comfortable with some facets of two-factor authentication.

The two-factor authentication platform adds a valuable layer of security to your existing solutions by requiring an additional credential beyond just your typical username and password. This can be a PIN that is generated by an application or even a physical token like a key fob that provides access.

To make a long story short, your employees may not feel entirely comfortable with your organization requiring them to keep an application on their phone as they may value the autonomy they have over what they do and don’t keep on their personal device. As a result, they are bound to have questions that you will need to answer.

To assist you with this, we’ve compiled a few questions you may have to field, and how to answer them truthfully and diplomatically if you choose to implement two-factor authentication for your business.

What is it?
Two-factor authentication is another way to improve data security and prevent threats from infiltrating business network’s access points. Picture your network as a house that your data lives in, with the front door being the access point. The lock on your doorknob is your usual access credentials, username and password. 2FA adds a deadbolt to that door.

In other words, 2FA is the added security that can keep many threats out, at the cost of a tiny bit of convenience.

Why do I have to do this?
This line of questioning is indicative that an employee is resistant to change--unfortunately, information technology is built on change. Threats to a business’ security are always improving so they have the best chance of creating the most impact. To counter this, a business must acknowledge the risks inherent in powerful technology platforms and do everything they can to control access to their network. 2FA is just one of many ways to do that.

It is also important to remember that a chain is only as strong as its weakest link, so the entire business could be made vulnerable if one person doesn’t have the same dedication to organizational network security as the rest of the team. By implementing 2FA as a team, the business is better protected by the team.

Why do I have to do it on my personal phone?
This answer has two parts to it, one in the best interest to the business, the other being for the employee’s benefit. First off, economics. Does your business have the capital to spare to distribute mobile devices for the singular purpose of enacting 2FA? Typically, this isn’t the case.

Furthermore, which device is an employee more likely to favor? Their personal device that they have conditioned themselves into bringing everywhere, or the new, unfamiliar device they were just given for work?

What happens if I lose or forget my phone?
There are ways to get around a forgotten or misplaced device. In many cases, an organization can adjust an employee’s 2FA settings to allow them access via a new 2FA code, but this will require the employee to change their credentials. If the phone is lost, the company is still safe, as the Mobile Device Management platform that the 2FA implementation was likely part of will allow network administrators the requisite authority to handle the situation.

Can you see my personal stuff?
This question will likely come up. You should ensure your employees that the privacy of their personal data will not be betrayed, and that the authenticator will only be used to access their company materials.

Information can be a touchy subject, and its security is of paramount importance. Reach out to us at SMART Services for more help with your company’s data security.

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 25 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.

 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Saturday, January 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

WIndows Server 2008 Best Practice Ciminal Data MySalesResults Legal Wireless Technology Charger Meetings Steve Anderson Computer Accessories Current Events Entertainment Humor Ransomware Ubuntu Data Privacy Microsoft Windows 7 Mouse Data Recovery Compliance SharePoint Wi-Fi Tablet Employer Employee Relationship Gamification webinar Settings PDF Financial Technology Software as a Service IT Budget Office Tips Touchpad Kleinschmidt Insurance Windows Ink Business Technology Virtualization Disaster Recovery HaaS Customer Relationship Management Going Green Workplace Tips Web Design iOS Worker Commute ISP Screen Mirroring Workers automation Printer Domains Holiday Battery Technology Emergency Computer Fan Cybersecurity Vendor Management Sales Tutorial File Storage Devices Nokia Fax Server Smartphone Best Practices Virtual Assistant Microsoft Excel Cleaning Branding Managing Stress Social Engineering Maintenance IT Support Unsupported Software Telephone Regulation Upgrades Data Theft Camera Operating Sysytem Upgrade Display Flexibility Utility Computing Scott White Google Docs WannaCry Computer repair Sports Accessory User Tips Server Information Technology Education Touchscreen Wasting Money Health Telephony Consultant Adobe Commerce Reputation Remote Workers Remote Monitoring Reliable Computing Saving Money Laptop Computer Care Keyboard Work Station Updates Networking Identity Theft Business Miscellaneous Electronic Medical Records Computer Chromecast Employer-Employee Relationship Windows 7 Programming Paperless Office SMB Computing Excel Internet Exlporer Black Market Operating System Television Music Gmail NFL Wireless Internet Colocation Data Loss Comparison social media Distributed Denial of Service Printing Computers User Cameras Word Update File Sharing Mobile Security Managed IT Services Advertising Mobile Computing Firewall Twitter Emails Teamwork Managed Service Scam Shortcut Applications Hyperlink IT Solutions Cost Management Hard Drive Taxes Mobility Financial spam eWaste Thank You Apple Mircrosoft Managed Service Provider Mobile Device Management Management Software Retail Remote Computing Spyware Smartphones IT consulting Storage Cloud Computing Cast Backup Data Backup hackers MSP email encryption Document Management Hosted Solution WiFi Sync Identities Cloud Machine Learning Office BDR Big Data Social Patch Management Save Time Proactive IT Tip of the Week Samsung Communication Shadow IT Managed IT Services Encryption Saving Time DDoS Solid State Drive Specifications Jerry Fetty Employee-Employer Relationship IT Services Chromebook Augmented Reality Innovation Business Management Apps Android Unified Threat Management Two-factor Authentication Books Access Students FAQ Bryant Caudill Hard Drives Online Currency Data Protection App Bloatware Virus Cybercrime Conferencing Analysis Analytics Vulnerability Doug Vanni Gifts Quick Tips Surge Protector Business Intelligence Buisness Dark Web Images VPN Internet of Things Collaboration Artificial Intelligence Managed IT Service 3D Printing Antivirus Blogging HIPAA Co-Managed Services Google Maps IIAI Bandwidth Experience IT Management robot Content Filter Congratulations Chevy HHR Microsoft Outlook 2007 Gadgets Science Identity hacker Microsoft Word Tech Term Amazon malware Email Intranet Privacy WIndows 7 Politics Phishing Scam Windows 10 insurance Peripheral Alert Hard Disk Drive Microsoft IT Support agency automation holidays Wireless Microsoft Outlook Monitoring Avoid Downtime WPA3 Phone System Avoiding Downtime SMART Services Instant Messaging In the News Network Security Windows 10 Cortana Microsoft Office Google Assistant Payroll Data Management Lifestyle End of Support Benefits Budget SaaS Microsoft Office 2010 Administrator Best Available Hacking iPhone VoIP Google Wearable Technology Near Field Communication Content Filtering Tablets Websites Private Cloud HITECH Act The Internet of Things Video Surveillance Testing IT Technicians Edge Automobile Streaming Media Efficiency OneDrive User Error Information Unified Communications Trending ebay Hosted Solutions Windows 8 Windows Application Text Messaging Passwords Net Neutrality Back Up USB Youtube Fraud Memory Outlook HBO Data Breach Debate Projects Media Consumption Human Resources SMARTweb Defense CrashOverride Marketing OneNote Password Extreme Technology Makeover Running Cable PowerPoint Backkup Search data backups Tech Tip Training Blockchain IoT Co-managed IT Virtual Private Network Hiring/Firing Security Wayne Joubert Credit Cards BYOD Security Cameras Users Money communications Productivity Save Money Phishing IT Service Facebook MAIA Safety Keyboard Shortcuts Point of Sale Scalability Travel Business Computing lunch and learn Nanotechnology Downtime Transportation Google Drive Take Your Agency to the Next Level Vendor Jessica Stevenson Uninterrupted Power Supply Tech Support Lithium-ion battery Regulations website Alexa for Business Fun Customer Service Admin Webinar Office 365 Presentation Language Mobile Devices Wasting Time press release How To Data Storage Network Congestion Work/Life Balance Browser Printer Server Productivity Smart Technology IT Consultant Video Games Mobile Device Managed IT Legislation Hetrick and Associates Recovery Audit Prodcutivity Biometrics Business Continuity Device Security Personal Information Data Security Hardware Social Networking Telephone Systems Computer Forensics Microblogging Company Culture Root Cause Analysis Hybrid Cloud Licensing IT solutions Risk Management Supercomputer Professional Services Proactive Network Law Enforcement Administration Small Business App store Outsourced IT Bluetooth Value Gift Giving Inbound Marketing Help Desk DocStar Virtual Reality Router Government Printers Bring Your Own Device Redundancy Project Management Evernote Mobile Office Internet Connectivity Access Control Files Wiring video iPad Chrome Virtual Desktop Applied TAM Wireless Charging GLAD History Disaster Windows 10s Mobile Smart Tech

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *