MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Two-Factor Authentication Frequently Asked Questions

Two-Factor Authentication Frequently Asked Questions

Data security has to be a core consideration of the modern business, so every small effort you can take to protect your business is important. One such effort is the implementation of two-factor authentication. However, your employees may not initially feel entirely comfortable with some facets of two-factor authentication.

The two-factor authentication platform, adds a valuable layer of security to your existing solutions by requiring an additional credential beyond just your typical username and password. This can be a PIN that is generated by an application or even a physical token like a key fob that provides access.

To make a long story short, your employees may not feel entirely comfortable with your organization requiring them to keep an application on their phone as they may value the autonomy they have over what they do and don’t keep on their personal device. As a result, they are bound to have questions that you will need to answer.

To assist you with this, we’ve compiled a few questions you may have to field, and how to answer them truthfully and diplomatically if you choose to implement two-factor authentication for your business.

What is it?
Two-factor authentication is another way to improve data security and prevent threats from infiltrating business network’s access points. Picture your network as a house that your data lives in, with the front door being the access point. The lock that you find in the doorknob is your usual access credentials, username and password. 2FA adds a deadbolt to that door.

In other words, 2FA is the added security that can keep many threats out, at the cost of a tiny bit of convenience.

Why do I have to do this?
This line of questioning is indicative that an employee is resistant to change--unfortunately, information technology is built on change. Threats to a business’ security are always improving so they have the best chance of creating the most impact. To counter this, a business must acknowledge the risks inherent in powerful technology platforms and do everything they can to control access to their network. 2FA is just one of many ways to do that.

It is also important to remember that a chain is only as strong as its weakest link, so the entire business could be made vulnerable if one person doesn’t have the same dedication to organizational network security as the rest of the team. By implementing 2FA as a team, the business is better protected by the team.

Why do I have to do it on my personal phone?
This answer has two parts to it, one being of best interest to the business, the other being for the employee’s benefit. First off, economics. Does your business have the capital to spare to distribute mobile devices for the singular purpose of enacting 2FA? Typically, this isn’t the case.

Furthermore, which device is an employee more likely to favor? Their personal device that they have conditioned themselves into bringing everywhere, or the new, unfamiliar device they were just given for work?

What happens if I lose or forget my phone?
There are ways to get around a forgotten or misplaced device. In many cases, an organization can adjust an employee’s 2FA settings to allow them access via a new 2FA code, but this will require the employee to change their credentials. If the phone is lost, the company is still safe, as the Mobile Device Management platform that the 2FA implementation was likely part of will allow network administrators the requisite authority to handle the situation.

Can you see my personal stuff?
This question will likely come up. You should ensure your employees that the privacy of their personal data will not be betrayed, and that the authenticator will only be used to access their company materials.

Information can be a touchy subject, and its security is of paramount importance. Reach out to us at MERIT Solutions for more help with your company’s data security.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Backup Business Management google Managed IT Services Computer Microsoft Mobile Devices Disaster Recovery Outsourced IT Business communications VoIP Business Continuity IT Support Windows 10 Hardware Innovation Cybersecurity Email User Tips Data Backup IT Services Cybercrime Efficiency Windows Saving Money Mobile Device Management Managed IT Server Ransomware Small Business Data Recovery Apps Tech Term Mobility Operating System Productivity browser Data Law Enforcement Internet of Things Smartphone Office 365 Android Virtualization Telephone Systems BDR Save Money Smartphones Hosted Solution Quick Tips Data Security Passwords Cloud Computing Money Phishing Recovery Communication VPN Microsoft Office BYOD Automation Password Managed Service Provider Holiday Information Technology Chrome Data Management App Data Breach Network Facebook Two-factor Authentication Government Wireless Google Drive Hacking Avoiding Downtime Update Risk Management Alert Collaboration Unsupported Software Health IT Support Miscellaneous Gadgets Computers Work/Life Balance Best Practice Cost Management Social Media Vulnerability Social Wi-Fi upgrade Application Budget Managed IT Services Current Events search Employer-Employee Relationship Audit Compliance Personal Information Tech Support Politics User Error Wireless Technology Cleaning USB Gmail Save Time Data Protection Telephony Identity Theft Workplace Tips Applications Private Cloud Office tips History Artificial Intelligence Flexibility Remote Computing Shortcut Social Engineering Proactive IT Streaming Media Spam Firewall The Internet of Things Antivirus Content Filtering Going Green Data Storage Battery Bandwidth HaaS OneNote eWaste Sports Automobile Project Management Value Data Loss Hacker Marketing Internet Exlporer Solid State Drive Saving Time Google Docs Office Computer Care Phone System iPhone Mobile Computing Legal Transportation Encryption Users IT solutions Redundancy Management Blockchain DDoS Commerce Robot Big Data Cortana Mobile Security End of Support Patch Management Devices Windows 10 Television Education Apple Google Assistant Vendor Management Router SaaS WiFi Excel Fraud Humor Disaster Wireless Charging Samsung Unified Threat Management Comparison Hard Drive Data storage Regulation Edge Computer Fan Evernote PowerPoint Training Entertainment Google Maps Virus Administration remote Chromecast Upgrades Electronic Medical Records Specifications Chromebook Yahoo Screen Mirroring Point of Sale Sync Ciminal Dark Web Networking Wireless Internet Company Culture HIPAA Running Cable Software as a Service Proactive Colocation Server 2008 Meetings Emails Consultant Safety Sales Smart Tech Hard Drives Black Market Ali Rowghani Cast Trending Workers Gamification Adobe Files Smart Technology Lithium-ion battery Websites Avoid Downtime Settings Administrator Retail Connectivity Shadow IT Updates Memory Document Management Licensing MSP WannaCry Experience Data Theft Relocation server installation dvd "cannot install required files" Access stock HBO Webinar Conferencing Content Filter Microsoft Word Students Mobile intranet Microsoft Excel Computing Video Games Remote Monitoring Virtual Reality tweet IT solutions Gifts Monitoring PDF Scam Unified Communications Professional Services IT budget Music File Sharing Analysis calculator Twitter IT Management Maintenance Windows 10s Text Messaging Employer Employee Relationship Financial Travel control Nanotechnology Analytics Storage App store Instant Messaging WSJ WIndows Server 2008 Device Security Hard Disk Drive Keyboard Credit Cards Financial Technology Computer Accessories Worker Commute Tablets Identities Exchange Root Cause Analysis Mobile Device Distributed Denial of Service altivista Managing Stress Laptop Uninterrupted Power Supply FAQ Printing NFL IoT SBS Augmented Reality Touchscreen Books Lifestyle Identity Scalability compaq Business Intelligence Outlook Spyware Touchpad Hiring/Firing Charger Wearable Technology Word Language Reputation Legislation Data Privacy Advertising How To hp Managed IT Service iOS Benefits Computer Forensics Windows Ink domain Emergency Cache Thank You Monitors Congratulations Worker CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...