Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Two Steps Are Better Than One, Where Security Is Concerned

You’re lucky to go a month without seeing news of some devastating data breach. With more businesses gearing up for the worst, what are you doing to protect your organization’s intellectual property and sensitive data? You can start by implementing a new type of authentication system that’s much more secure than your current security strategy--two-factor authentication.

It’s no secret that a password is no longer as secure as it used to be. Advanced technology used by hackers can crack even the most secure passwords with enough time. This is because many users tend to opt for passwords that are either easy to guess, not complex enough, or are simply quite obvious for one reason or another. We’ll walk you through some of the common scenarios that you might encounter for password security, and how two-factor authentication can solve it.

For example, many users have to change their passwords so frequently that they may be mind-boggled about how to remember each and every one of them. Proper passwords should be at least 12 characters long, including special characters, both upper and lower-case letters, numbers, and symbols. The best way to approach building a password is to include all of this information in a seemingly random string, but users will often try to use something that they will remember--information that can often be stolen during a hacking attack, or found on social media.

What if you use your first-born’s name in your password? That’s information that could easily be found in public records. The same can be said for the name of your parents, which school you went to, and even your favorite TV show via social media. Thanks to the Internet, hackers have all of the tools they need to find plenty of information about you--information that you might subconsciously be using either as a security question or for a password.

Therefore, if you are taking advantage of a complex password, it makes sense from a logical standpoint that you would only want to remember one of those, at most, at any given time. Unfortunately, this has a negative side-effect on security, because if a hacker gains access to one account through the password, they will have access to all of your accounts through the password.

Password managers make it easier to remember complex passwords, but the issue remains the same. If a hacker has access to your password, what keeps them from accessing your accounts? Two-factor authentication is the answer. Two-factor authentication essentially adds a secondary level of security to any online account or network access point. Where you once may have needed only a password, you’ll now have to use some sort of secondary credential, be it a mobile device or an email to a secondary account. It’s just one small way you can protect your organization, and it doesn’t take long to set up.

Does your organization need help setting up two-factor authentication? To learn more, reach out to us at 866.625.3560.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 23 November 2017

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Email Malware Business Microsoft Hosted Solutions Computer Business Computing Internet Windows 10 Backup Ransomware Software IT Services Windows Google User Tips Productivity Hardware Network Security Smartphone Data Management Android Data Small Business Phishing Business Continuity Facebook App Upgrade Smartphones Saving Money Mobile Devices Gmail Browser Microsoft Office Office Tips Big Data Managed IT Services Cloud Computing IT Support Word Internet of Things Office 365 Tip of the week Workplace Tips Remote Monitoring Efficiency Spam Miscellaneous Data storage Social Media Cybersecurity Productivity Artificial Intelligence Data Recovery Disaster Recovery Customer Service Managed Service Provider Server Apple Settings Outsourced IT Content Filtering Employer-Employee Relationship Robot Risk Management IT Support WiFi Innovation Telephone Systems LiFi Maintenance Chrome Analytics End of Support IBM Wireless Antivirus Apps Outlook Customer Relationship Management Hacking Save Money Money Search Firewall Passwords SaaS Administration Presentation Hacker Avoiding Downtime VoIP Two-factor Authentication Office Password Mouse Wireless Technology Unified Threat Management Recovery Monitors Encryption Windows 10 Network Tablet Hosted Solution YouTube Mobile Device communications Printing Virtual Private Network Safety Computing Google Drive Managed IT Services The Internet of Things IT Management Information Technology Black Friday Statistics Virtualization Google Docs Address Halloween Quick Tips Politics Users Windows 8 User Error Google Wallet Cyber Monday Bluetooth Collaboration Data Backup Corporate Profile Scary Stories VoIP Printer How To Drones Bandwidth File Sharing User Samsung Network Congestion WannaCry Sports Time Management Wi-Fi Websites Social Access Control Virtual Reality Education Cabling Competition Humor Deep Learning Business Technology Computers Data loss Network Management 5G Hacks SharePoint Budget Managed IT Infrastructure sip Bring Your Own Device Lenovo Display Digital Buisness Touchscreen Marketing Downloads IT solutions Shortcut Disaster IP Address telephony Government Best Practice Superfish Spyware Digital Payment Multi-Factor Security Patch Management Cortana Uninterrupted Power Supply Website Mobile Office Storage BYOD Business Growth Scam Automation Google Calendar Downtime Hard Drives Current Events Legal Vulnerability Solid State Drive How To Mobile Device Management Computer Care Dark Data Alt Codes Networking Communication Cybercrime Going Green Legislation Vendor Management Heating/Cooling IT service Refrigeration VPN Knowledge Hard Disk Drive Public Speaking Firefox Lithium-ion battery Training Typing Data Security Writing Comparison Servers Augmented Reality BDR Automobile Operating System Unified Communications Experience Running Cable Cryptocurrency Techology Retail Specifications Virtual Desktop Server Management Fun Google Maps Undo Mail Merge Laptop Application Gadgets Bitcoin Unified Threat Management Social Engineering Computer Repair Business Management Cameras Processors Tracking Health CCTV Alert Document Management Tech Support Electronic Medical Records Emergency Identity Theft Travel G Suite Notifications Supercomputer Botnet Upgrades Motion Sickness Taxes Crowdsourcing IT Budget Machine Learning 3D Printing Update IT Consultant Relocation Mobile Computing Unsupported Software Meetings Chromebook Cleaning CrashOverride Mobile Data Private Cloud Webcam Emoji Domains Work/Life Balance Error Point of Sale Black Market Law Enforcement Physical Security Paperless Office Twitter Staffing Gadget Personal Information Administrator Web Server Remote Computing GPS Holiday