SMART Blog

Smart Services has been providing independent agents with proactive, fast, and expert technology services since 1991.

Two-Factor Authentication Frequently Asked Questions

Two-Factor Authentication Frequently Asked Questions

Data security is such a core consideration of the modern business that every small effort you can take to protect your business is important. One such effort is the implementation of two-factor authentication. However, your employees may not initially feel entirely comfortable with some facets of two-factor authentication.

The two-factor authentication platform adds a valuable layer of security to your existing solutions by requiring an additional credential beyond just your typical username and password. This can be a PIN that is generated by an application or even a physical token like a key fob that provides access.

To make a long story short, your employees may not feel entirely comfortable with your organization requiring them to keep an application on their phone as they may value the autonomy they have over what they do and don’t keep on their personal device. As a result, they are bound to have questions that you will need to answer.

To assist you with this, we’ve compiled a few questions you may have to field, and how to answer them truthfully and diplomatically if you choose to implement two-factor authentication for your business.

What is it?
Two-factor authentication is another way to improve data security and prevent threats from infiltrating business network’s access points. Picture your network as a house that your data lives in, with the front door being the access point. The lock on your doorknob is your usual access credentials, username and password. 2FA adds a deadbolt to that door.

In other words, 2FA is the added security that can keep many threats out, at the cost of a tiny bit of convenience.

Why do I have to do this?
This line of questioning is indicative that an employee is resistant to change--unfortunately, information technology is built on change. Threats to a business’ security are always improving so they have the best chance of creating the most impact. To counter this, a business must acknowledge the risks inherent in powerful technology platforms and do everything they can to control access to their network. 2FA is just one of many ways to do that.

It is also important to remember that a chain is only as strong as its weakest link, so the entire business could be made vulnerable if one person doesn’t have the same dedication to organizational network security as the rest of the team. By implementing 2FA as a team, the business is better protected by the team.

Why do I have to do it on my personal phone?
This answer has two parts to it, one in the best interest to the business, the other being for the employee’s benefit. First off, economics. Does your business have the capital to spare to distribute mobile devices for the singular purpose of enacting 2FA? Typically, this isn’t the case.

Furthermore, which device is an employee more likely to favor? Their personal device that they have conditioned themselves into bringing everywhere, or the new, unfamiliar device they were just given for work?

What happens if I lose or forget my phone?
There are ways to get around a forgotten or misplaced device. In many cases, an organization can adjust an employee’s 2FA settings to allow them access via a new 2FA code, but this will require the employee to change their credentials. If the phone is lost, the company is still safe, as the Mobile Device Management platform that the 2FA implementation was likely part of will allow network administrators the requisite authority to handle the situation.

Can you see my personal stuff?
This question will likely come up. You should ensure your employees that the privacy of their personal data will not be betrayed, and that the authenticator will only be used to access their company materials.

Information can be a touchy subject, and its security is of paramount importance. Reach out to us at SMART Services for more help with your company’s data security.

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 25 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Alert Twitter Bluetooth Remote Monitoring email encryption social media Virtual Desktop WiFi Co-managed IT Microsoft Outlook 2007 End of Support Licensing WannaCry Commerce MySalesResults Reputation Miscellaneous Company Culture HaaS Going Green Phishing Scam Proactive IT Customer Relationship Management Smartphones Bring Your Own Device Best Practice Shadow IT Music Settings Safety Books Managed IT Services Consultant 3D Printing IT Service Bloatware Upgrade Microsoft Office 2010 Gift Giving Office Mircrosoft Amazon automation Productivity Legislation Tip of the Week Redundancy Domains insurance WIndows 7 Smartphone Help Desk FAQ Virtualization Device Security BYOD Two-factor Authentication Human Resources Upgrades Distributed Denial of Service Best Available Big Data Content Filtering Outsourced IT Internet of Things Mobile Device Management Cortana agency automation Data Backup SMARTweb Defense PDF HITECH Act Taxes Best Practices Tablets spam Operating Sysytem Mobile Device hackers Collaboration Fun Webinar Windows 10 User Chevy HHR Net Neutrality Wayne Joubert Lithium-ion battery Risk Management Laptop Apple Shortcut Paperless Office IT Budget Phishing Hosted Solutions IT consulting SaaS Holiday Customer Service Wearable Technology Search Unified Threat Management Microsoft Outlook Business Employer-Employee Relationship Updates Adobe website CrashOverride Text Messaging Computer Law Enforcement Operating System Administration Root Cause Analysis Managed IT Service Images Legal Tech Tip Managing Stress lunch and learn Computer Care IT Services Disaster Reliable Computing Windows Ink Facebook Users Data Printer HIPAA Disaster Recovery Saving Time Gadgets Colocation OneDrive Computers Computer Fan SharePoint How To Google Docs MAIA Maintenance Wireless Technology Hard Disk Drive Artificial Intelligence Storage Hacking Document Management In the News holidays Privacy Lifestyle Ransomware Compliance press release Touchpad eWaste Software Touchscreen Video Surveillance iPad Windows 10s Communication Nanotechnology Mobile Office Science Youtube Data Recovery VoIP IT Technicians Employer Employee Relationship Antivirus Gmail Money Scott White Worker Commute Electronic Medical Records Emergency Network Computer Accessories Android Backup Cloud Devices Application Politics Work/Life Balance Intranet Data Security Mobility History Current Events Apps Spyware Kleinschmidt Insurance Internet Exlporer Social Telephone Systems Bandwidth Marketing Online Currency Branding Recovery Quick Tips Data Management Charger Cybercrime Scalability Debate OneNote Password Hard Drive Vendor Management Data Breach Emails Trending Managed IT Services Advertising NFL Data Storage hacker Applications Microsoft Computer repair Fax Server Security Cleaning Mobile Devices DocStar Web Design Cloud Computing Files Word Mobile Identity Theft Uninterrupted Power Supply Hosted Solution Nokia Programming GLAD Teamwork Bryant Caudill Outlook USB PowerPoint Networking WIndows Server 2008 Near Field Communication App IT Solutions Presentation iOS Television Business Management Professional Services Vulnerability Computing Wireless Charging Cast Surge Protector Thank You Congratulations Experience Server File Sharing Analytics Take Your Agency to the Next Level Managed Service Provider Windows Audit Tablet Network Security Solid State Drive User Error Retail Phone System Microblogging Wireless Printer Server Augmented Reality Meetings Save Time Browser Evernote Data Protection Productivity Jessica Stevenson Wi-Fi Credit Cards video webinar Business Computing Data Loss Sports The Internet of Things Cybersecurity Regulation Encryption Tech Support Efficiency Hard Drives Supercomputer Display User Tips Specifications Router Keyboard Office Tips Unsupported Software DDoS Hardware Humor Small Business Patch Management Remote Computing Business Continuity IT Support Excel Streaming Media Google Maps robot Tutorial Avoiding Downtime IT Consultant Workers Gifts Video Games IIAI Technology Managed IT Training Internet Screen Mirroring Google Drive Transportation Avoid Downtime Hiring/Firing Passwords Steve Anderson ebay Hetrick and Associates Education Email Biometrics Administrator Microsoft Windows 7 Comparison communications Budget Google Access Firewall IT Support ISP Battery Sales Business Intelligence Office 365 Regulations Ubuntu Benefits Samsung Chrome Blogging Virus data backups Sync Scam Instant Messaging Prodcutivity Social Networking Value SMART Services Social Engineering Buisness Dark Web Software as a Service Microsoft Office Microsoft Excel malware Mobile Computing Smart Technology Black Market Virtual Reality Network Congestion Government Flexibility Backkup Information Technology Microsoft Word Automobile Wiring Mouse Extreme Technology Makeover IT solutions IT Management Chromecast Innovation Entertainment BDR Running Cable Telephony Media Consumption Travel Cameras Windows 10 Windows 8 Doug Vanni VPN Personal Information Private Cloud Applied TAM HBO Save Money iPhone Conferencing Inbound Marketing Point of Sale Jerry Fetty Workplace Tips Update Saving Money Cost Management Work Station Health Back Up

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *