• Home
  • Contact Us
  • Office Hours: 8:00 AM – 5:30 PM
  • 01482 828000
Logo
  • Software Solutions
    • Sage Solutions
      • Sage 200 Standard
      • Sage 200 Professional
      • Sage 50
      • Sage CRM
    • Add-Ons
      • Cim50
      • Cim200
      • Qnect 50
      • Qnect 200
      • Draycir Products
      • Sicon Additions
      • Sicon Manufacturing
      • Sage200 Expense Management Software
      • SmarterPay BACS Solution
    • Sage Support
    • Add-On Software Support
    • Sage Consultancy & Training
  • IT Solutions
    • Managed IT Support Hull
    • Microsoft 365 Solutions
    • Server Solutions
    • IT Procurement
    • SonicWALL Solutions
    • Remote Managing & Monitoring
    • Offsite Backup
    • 3CX VoIP Provider
    • Azure Migration
  • Reality Cloud
  • About Reality
    • Contact Us
    • About Reality
    • Team Members
  • Blogs

How to use Multi-Factor Authentication to make your business secure.

  • Home
  • Blog Details
  • October 24 2019
  • Rosie Garmston

‘Please enter the OTP we’ve sent to your phone.’

‘Where were you born?’

‘We need to access your location.’

We’re assuming you’ve come across some of these requests when entering an account and perhaps greeted them with an eye roll. After all, how hard does it have to be to gain access to your own data?!

Frustrating though they may be, there’s a good reason these things exist.

All of the above requests are examples of evidence or factors used as part of a process called multi-factor authentication or two-factor authentication. Only once all these factors are satisfied are you allowed access to the asset you’re trying to get into.

Multi-factor authentication is an increasingly popular and necessary way of securing your data, info and accounts. By adding extra layers to your security, you are making it harder for hackers to get in.

Someone trying to access your accounts could feasibly get hold of your password or passwords. But it’s highly unlikely that they would be able to get hold of your thumbprint… You’d hope.

Many companies and indeed mobile devices give you the option to choose how you want to secure your assets. Depending on what factors you choose to implement, different forms of authentication are used in conjunction with one another to ensure only you can get in.

These factors can usually be split into four different categories. We look at the pros and cons of each below.

 

Knowledge Factors

The most common form of authentication.

Passwords are everywhere and are used in just about everything whether you’re buying pyjamas or accessing a government database. As you do. They aren’t the only factor that requires prior knowledge however.

You will often see follow up security questions which request a fact that supposedly only you would know. Other examples of knowledge factors in common use are the PIN you use to get into an ATM.

Ultimately knowledge factors aren’t that secure on their own which is why it’s becoming increasingly common to see them used as one part of multi-factor authentication.

Pros:

  • Easy to use.
  • You can use a password manager to store lots of unique passwords, making your network even safer.
  • Easy to implement and low cost.

Cons:

  • Easy to hack.
  • Security questions aren’t really that secure. Those with the knowhow could probably find this info fairly easily.

Possession Factors

If you think about it, this is the oldest form of authentication. For thousands of years physical assets have been secured by lock and key. In order to get in, you need the key that fits the lock. Of course, they’re still used in most domestic properties. For now…

And possession factors are used in some areas of business. Certain assets can be accessed by providing a particular fob, key card or USB stick. It used to be quite common for companies to use these tokens to provide their employees with access to the network.

The user interface is simpler and allows for additional functionality but they’re a lot less popular now as these items can be corrupted or potentially used to carry harmful malware and data into the company.

A possession factor which is on the increase is the use of the mobile smartphone, primarily because most of us have got one. Using this as a method of access is fairly reliable as we’re much less likely to lose it and can download relevant and secure apps that relate directly to what we’re trying to access. The mobile is often used in conjunction with inherent factors…

Pros:

  • Simple to use.
  • Doesn’t require knowledge.

Cons:

  • Can be easily lost or stolen.
  • Risk of corruption.
  • Can carry malware so particularly dangerous for businesses.

Inherent Factors

Facial recognition, fingerprints and voice activation. These are all inherent factors because they are directly associated to the user.

Inherent factors are becoming increasingly popular as the technology to read them becomes more easily accessible and readily implemented into our devices. Many smartphones now have fingerprint sensors and in the case of the latest iPhone, facial recognition.

Voice-activated tools like Siri have also been present in our devices for some time although they’re not as often used for authentication. The rise of Amazon Alexa and other virtual assistants shows the clear implications of where voice activation could be taken.

As voice technology improves so will its prevalence in multi-factor authentication as it’s possibly one of the things we have the most control over and is most unique to us.

In the meantime, fingerprints are now a major part of multi-factor authentication. When accessing a bank account or other secure location, you will often be prompted to use your phone’s sensor in conjunction with a One Time Passcode (OTP) or password to gain access.

Pros:

  • Very hard to fake.
  • Completely unique to you.
  • Easy to provide.

Cons:

  • Not always reliable.
  • Requires dedicated hardware.
  • Could be faked with some serious dedication… (Depends what you’ve got to hide).

Location Based Factors

An increasingly popular method of authentication which uses your GPS location to establish whether it matches that of the asset. Hackers are capable of mimicking many types of factors in order to get to your data but your GPS location is pretty difficult to fake.

This is a particularly useful method for those using a private network in an office. Directors can rest assured that when used alongside another factor such as a password or PIN, access is only guaranteed to those within the office.

Pros:

  • Difficult to fake.

Cons:

  • Not necessarily unique to one individual.

Better Together

Essentially all of these factors have limited usefulness on their own so using them as part of a multi-factor authentication process is the only way of guaranteeing complete security.

Some examples of where this is implemented in commonly used software is Microsoft Office 365, Google Chrome and password managers like LastPass and Dashlane. A lot of data is transferred through Office 365’s Business applications so it’s of utmost importance that it is protected.

Likewise, the Chrome web browser is often used as one unified suite of tools with a great deal of personal and company data transferred within. It will often require an encryption key and mobile phone authentication as well as your Google account passwords to get access.

At Reality Solutions, we thoroughly recommend these products and the use of multi-factor authentication across all your assets to ensure your business is fully secure.

To find out more about how you can secure your business assets and implement products like Office 365, make sure to get in touch.

 

Previous Post
CELEBRATING 20 YEARS IN BUSINESS IN FILM
Next Post
Meet our Director – Amy Pittock

Recent Posts

  • How Cyber Essentials Can Protect Your Hull Business from Cyber Threats
  • How Sage Simplifies Digital Tax Solutions for Businesses
  • Choosing the Right Firewall for Your Business
  • Accounting Automation Tools: The Future For Businesses
  • 5 Benefits of an IT Roadmap for Small Businesses

Recent Comments

No comments to show.

Archives

  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • October 2019
  • February 2019
  • January 2019
  • August 2018
  • July 2018
  • June 2018
  • April 2018
  • March 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • April 2017
  • February 2017
  • August 2016
  • June 2016
  • May 2016

Categories

  • IT
  • Sage
  • Uncategorised

Recent Posts

  • How Cyber Essentials Can Protect Your Hull Business from Cyber Threats
  • How Sage Simplifies Digital Tax Solutions for Businesses
  • Choosing the Right Firewall for Your Business
  • Accounting Automation Tools: The Future For Businesses
  • 5 Benefits of an IT Roadmap for Small Businesses

Categories

  • IT 79
  • Sage 61
  • Uncategorised 11

Recent Comments

    Tags

    Business Benefits Charity Fundraising Macmillan Macmillan Cancer Support Microsoft 365 Security Virtual Private Network VPN Work Remotely
    Shape
    Logo

    Company

    • Contact Us
    • About Reality
    • Meet Our Team
    • LinkedIn
    • Privacy Policy

    Contact Info

    • Reality Solutions Limited. 1 Global Business Park, Hamburg Road, Hull, East Yorkshire. HU70AE
    • info@realitysolutions.co.uk
    • 01482 828000

    • Home
    • Contact