773-635-5100    Let's Meet    Get SUPPORT

Shartega Systems Blog

Shartega Systems has been serving the Chicago area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Two-Factor Authentication Frequently Asked Questions

Two-Factor Authentication Frequently Asked Questions

Data security has to be a core consideration of the modern business, so every small effort you can take to protect your business is important. One such effort is the implementation of two-factor authentication. However, your employees may not initially feel entirely comfortable with some facets of two-factor authentication.

The two-factor authentication platform, adds a valuable layer of security to your existing solutions by requiring an additional credential beyond just your typical username and password. This can be a PIN that is generated by an application or even a physical token like a key fob that provides access.

To make a long story short, your employees may not feel entirely comfortable with your organization requiring them to keep an application on their phone as they may value the autonomy they have over what they do and don’t keep on their personal device. As a result, they are bound to have questions that you will need to answer.

To assist you with this, we’ve compiled a few questions you may have to field, and how to answer them truthfully and diplomatically if you choose to implement two-factor authentication for your business.

What is it?
Two-factor authentication is another way to improve data security and prevent threats from infiltrating business network’s access points. Picture your network as a house that your data lives in, with the front door being the access point. The lock that you find in the doorknob is your usual access credentials, username and password. 2FA adds a deadbolt to that door.

In other words, 2FA is the added security that can keep many threats out, at the cost of a tiny bit of convenience.

Why do I have to do this?
This line of questioning is indicative that an employee is resistant to change--unfortunately, information technology is built on change. Threats to a business’ security are always improving so they have the best chance of creating the most impact. To counter this, a business must acknowledge the risks inherent in powerful technology platforms and do everything they can to control access to their network. 2FA is just one of many ways to do that.

It is also important to remember that a chain is only as strong as its weakest link, so the entire business could be made vulnerable if one person doesn’t have the same dedication to organizational network security as the rest of the team. By implementing 2FA as a team, the business is better protected by the team.

Why do I have to do it on my personal phone?
This answer has two parts to it, one being of best interest to the business, the other being for the employee’s benefit. First off, economics. Does your business have the capital to spare to distribute mobile devices for the singular purpose of enacting 2FA? Typically, this isn’t the case.

Furthermore, which device is an employee more likely to favor? Their personal device that they have conditioned themselves into bringing everywhere, or the new, unfamiliar device they were just given for work?

What happens if I lose or forget my phone?
There are ways to get around a forgotten or misplaced device. In many cases, an organization can adjust an employee’s 2FA settings to allow them access via a new 2FA code, but this will require the employee to change their credentials. If the phone is lost, the company is still safe, as the Mobile Device Management platform that the 2FA implementation was likely part of will allow network administrators the requisite authority to handle the situation.

Can you see my personal stuff?
This question will likely come up. You should ensure your employees that the privacy of their personal data will not be betrayed, and that the authenticator will only be used to access their company materials.

Information can be a touchy subject, and its security is of paramount importance. Reach out to us at Shartega Systems for more help with your company’s data security.

Business Communications You Can Depend On
Tip of the Week: Syncing Email Across Multiple Dev...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Privacy Network Security Best Practices Software Technology Productivity Hackers Malware Business Computing Managed IT Services Cloud IT Support Disaster Recovery Outsourced IT Backup Mobile Devices Google Internet Business Continuity Data Backup Windows 10 Microsoft IT Services Business Management Managed IT Hosted Solutions Email Small Business Data Recovery User Tips Ransomware Mobility Communications WIndows Cybersecurity Alert Saving Money Efficiency Business Server VoIP Law Enforcement Office 365 Vulnerability Save Money Smartphone Mobile Device Management Hardware Phishing Health Unsupported Software Cybercrime Cloud Computing Innovation Hosted Solution Social Media Money Android Microsoft Office Two-factor Authentication Avoiding Downtime App Shortcut Data Information Technology Apps Politics Google Drive Budget Gadgets Browser Miscellaneous Office tips Virtualization Wireless Firewall Data Security Chrome Best Practice Audit Computer Facebook Managed Service Provider Government BYOD Collaboration BDR Holiday Smartphones Quick Tips Saving Time iPhone Risk Management Applications Google Docs Computer Care Commerce Identity Theft The Internet of Things Data Breach SaaS WiFi Operating System Redundancy Work/Life Balance Application HaaS Computers Telephone Systems Search Battery Personal Information Data Storage End of Support Cost Management Cortana Content Filtering Passwords Wireless Technology Compliance Samsung Data Protection Automobile Marketing OneNote USB Data Management Cleaning User Error Spam Encryption Social Proactive IT Save Time HIPAA Humor Networking Office Professional Services Data Loss Computer Fan Retail WIndows Server 2008 IT Support Managed IT Services PDF Workers Travel Augmented Reality Dark Web Automation Conferencing Patch Management Current Events Updates Tablets Microsoft Excel Solid State Drive Gifts Hacking Outlook Experience Emails Text Messaging Microsoft Word NFL File Sharing Employer-Employee Relationship Education Users Nanotechnology Business Intelligence Password Excel Phone System Webinar Maintenance Word Television Storage Root Cause Analysis Managed IT Service Unified Threat Management Credit Cards Regulation Black Market IT solutions Artificial Intelligence eWaste Windows Ink Mobile Device Sports FAQ Sync Wi-Fi Shadow IT Google Maps Lifestyle HBO Communication Point of Sale CrashOverride History Screen Mirroring Upgrades Charger Adobe VPN Disaster Router Internet of Things Legislation Electronic Medical Records Hacker Antivirus Cast Flexibility Consultant Internet Exlporer Wireless Charging Smart Technology Software as a Service Training Avoid Downtime Comparison Emergency IT Management Meetings Advertising WannaCry Licensing Apple Virtual Reality Company Culture Specifications Reputation IT Solutions Document Management Settings Update Touchscreen Evernote Productivity Mobile Hard Drives iOS Value Mobile Computing Sales Keyboard Network Public Speaking Instant Messaging Lithium-ion battery How To Scam Private Cloud Tech Support Video Games Benefits Safety Employer Employee Relationship Hiring/Firing Analytics Managing Stress Remote Computing Worker Commute Competition Big Data Computer Accessories Fun Books Transportation Upgrade Recovery Legal Music Vendor Management Presentation Telephony Windows 10s Device Security 5G Workplace Tips IBM Hard Disk Drive Devices Customer Relationship Management Windows 10 Spyware Taxes IP Address Website Scalability Remote Monitoring Customer Service Supercomputer Mobile Office Entertainment Domains IT Budget

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *