SMART Blog

Smart Services has been providing independent agents with proactive, fast, and expert technology services since 1991.

Two-Factor Authentication Frequently Asked Questions

Two-Factor Authentication Frequently Asked Questions

Data security is such a core consideration of the modern business that every small effort you can take to protect your business is important. One such effort is the implementation of two-factor authentication. However, your employees may not initially feel entirely comfortable with some facets of two-factor authentication.

The two-factor authentication platform adds a valuable layer of security to your existing solutions by requiring an additional credential beyond just your typical username and password. This can be a PIN that is generated by an application or even a physical token like a key fob that provides access.

To make a long story short, your employees may not feel entirely comfortable with your organization requiring them to keep an application on their phone as they may value the autonomy they have over what they do and don’t keep on their personal device. As a result, they are bound to have questions that you will need to answer.

To assist you with this, we’ve compiled a few questions you may have to field, and how to answer them truthfully and diplomatically if you choose to implement two-factor authentication for your business.

What is it?
Two-factor authentication is another way to improve data security and prevent threats from infiltrating business network’s access points. Picture your network as a house that your data lives in, with the front door being the access point. The lock on your doorknob is your usual access credentials, username and password. 2FA adds a deadbolt to that door.

In other words, 2FA is the added security that can keep many threats out, at the cost of a tiny bit of convenience.

Why do I have to do this?
This line of questioning is indicative that an employee is resistant to change--unfortunately, information technology is built on change. Threats to a business’ security are always improving so they have the best chance of creating the most impact. To counter this, a business must acknowledge the risks inherent in powerful technology platforms and do everything they can to control access to their network. 2FA is just one of many ways to do that.

It is also important to remember that a chain is only as strong as its weakest link, so the entire business could be made vulnerable if one person doesn’t have the same dedication to organizational network security as the rest of the team. By implementing 2FA as a team, the business is better protected by the team.

Why do I have to do it on my personal phone?
This answer has two parts to it, one in the best interest to the business, the other being for the employee’s benefit. First off, economics. Does your business have the capital to spare to distribute mobile devices for the singular purpose of enacting 2FA? Typically, this isn’t the case.

Furthermore, which device is an employee more likely to favor? Their personal device that they have conditioned themselves into bringing everywhere, or the new, unfamiliar device they were just given for work?

What happens if I lose or forget my phone?
There are ways to get around a forgotten or misplaced device. In many cases, an organization can adjust an employee’s 2FA settings to allow them access via a new 2FA code, but this will require the employee to change their credentials. If the phone is lost, the company is still safe, as the Mobile Device Management platform that the 2FA implementation was likely part of will allow network administrators the requisite authority to handle the situation.

Can you see my personal stuff?
This question will likely come up. You should ensure your employees that the privacy of their personal data will not be betrayed, and that the authenticator will only be used to access their company materials.

Information can be a touchy subject, and its security is of paramount importance. Reach out to us at SMART Services for more help with your company’s data security.

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 25 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 17 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Save Time Scott White Management Websites File Sharing malware Telephone Systems Personal Information User Tips Battery Advertising Budget Ciminal Sales Internet Fraud Net Neutrality Value Regulation Technology Bryant Caudill Prodcutivity Productivity Electronic Medical Records Colocation press release agency automation Administration Gadgets Best Practices Smart Technology Updates Telephony Gamification Spyware Paperless Office Managed IT Service Bloatware Training Word iPhone Business Continuity Encryption IT Support Work/Life Balance Webinar Mobile Device Amazon Microblogging Cybersecurity Business Management Outsourced IT Settings Compliance MySalesResults Benefits Data Protection HBO Current Events Legislation Server Web Design Innovation Efficiency Mobile Security Shadow IT Google Drive Computers Sports Data Backup Flexibility MAIA eWaste Teamwork Video Surveillance Chromecast Quick Tips Blockchain SharePoint Document Management Windows Ink Hybrid Cloud Managed IT Services Windows 8 social media Windows Hacking Operating Sysytem SaaS Office Applications HaaS Social Branding Company Culture Music robot WannaCry Avoid Downtime Wireless Internet Mouse Education Wayne Joubert Data Privacy Point of Sale Wi-Fi holidays Managed IT Services Supercomputer Science App store Meetings Google Assistant VoIP Best Available Near Field Communication Devices Domains Data Recovery Data Storage Gmail Router Work Station Wireless Technology Managed Service Provider Data Loss IT Solutions Running Cable Retail hackers IT Services Apple Licensing Taxes Scam PowerPoint Outlook GLAD automation Phishing Microsoft Windows 7 Customer Service Keyboard Health Device Security Marketing Law Enforcement Recovery Television Office Tips Alert Tip of the Week Identities HIPAA Unified Threat Management Fun Miscellaneous Intranet Upgrade Computer repair Apps Trending Bring Your Own Device OneDrive Operating System OneNote Disaster Congratulations Privacy Experience Vendor Management Networking Transportation Private Cloud Productivity Twitter Emails IT Budget Cast Business Intelligence Regulations Identity Theft BYOD Credit Cards Collaboration Virtualization Remote Computing Patch Management Network Cybercrime Tech Support Computer Fan IT Management Hiring/Firing Microsoft Antivirus Business How To WIndows Server 2008 Buisness Books insurance Edge Memory ISP Language Samsung Microsoft Outlook 2007 Take Your Agency to the Next Level Worker Commute Co-managed IT Microsoft Outlook WiFi Computer Accessories Nokia Ransomware App Computer Employer Employee Relationship Video Games Nanotechnology Black Market Reputation Wearable Technology website Mircrosoft IoT Emergency Software as a Service Mobile Device Management Screen Mirroring Communication Search Printer Analytics Jessica Stevenson Laptop Smart Tech Risk Management Printer Server Content Filter Workplace Tips iPad Wireless Charging iOS Redundancy Adobe Excel Windows 10 ebay Automobile Chromebook Update Cloud Computing IT solutions Virtual Reality email encryption CrashOverride Data Breach Business Computing Money Administrator Proactive Financial Microsoft Office 2010 Network Congestion video Comparison WIndows 7 Going Green Virtual Desktop Evernote Google Docs Tablets Tech Tip Entertainment Shortcut Upgrades Legal Fax Server Bluetooth Distributed Denial of Service Firewall Workers Monitoring IT Support Saving Time Wasting Money Data Management Thank You Internet of Things Passwords Backup Online Currency Politics Wiring Virus Wireless IT consulting History Browser Employer-Employee Relationship Facebook Users Government Tablet Data Theft Internet Exlporer Google Maps DDoS Surge Protector Sync Cleaning Instant Messaging Cameras Computer Forensics Mobile Devices Travel Hard Disk Drive Identity Mobile Analysis webinar SMART Services Help Desk Remote Monitoring Reliable Computing Save Money Students IT Service Tech Term Hosted Solution Files Chevy HHR Social Networking Small Business End of Support Biometrics Specifications Text Messaging spam 3D Printing Chrome Youtube Kleinschmidt Insurance Computer Care Artificial Intelligence Phishing Scam Hardware hacker Cloud Debate Images Access IT Consultant Uninterrupted Power Supply Windows 10s Network Security Email Application Lifestyle Content Filtering Backkup Steve Anderson Managing Stress USB Bandwidth Password Financial Technology Connectivity Disaster Recovery Scalability lunch and learn Conferencing Cost Management Hetrick and Associates IT Technicians The Internet of Things NFL Audit Streaming Media Data Smartphone SMARTweb Defense Holiday Touchpad Augmented Reality Vulnerability Hard Drives Gifts Presentation Hard Drive Best Practice PDF Phone System Inbound Marketing Maintenance HITECH Act User Error Business Technology Gift Giving Programming Doug Vanni Project Management Applied TAM Commerce Dark Web Customer Relationship Management Extreme Technology Makeover Human Resources Proactive IT Unsupported Software Two-factor Authentication Office 365 Solid State Drive Charger Saving Money Microsoft Office Information Technology Smartphones IIAI Blogging Root Cause Analysis Hosted Solutions Microsoft Word Back Up Touchscreen In the News Mobility Social Engineering Android Tutorial Unified Communications BDR Cortana Safety Mobile Computing Display MSP Data Security Professional Services Virtual Assistant DocStar Big Data Computing Jerry Fetty Microsoft Excel Consultant Windows 10 Avoiding Downtime Humor FAQ VPN Managed IT Printing Lithium-ion battery Alexa for Business User Security Google Media Consumption data backups Mobile Office Ubuntu Software Storage communications

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *