0800 970 8980 enquiries@lpnetworks.com

2FA – Two Factor Authentication – Best Practice for Increased Cyber Security


Posted 30th November 2018


2FA – Two Factor Authentication – Best Practice for Increased Cyber Security

Two Factor Authentication, or 2FA, as it is often shortened to, has become the benchmark in best practice for increased computer security.

So, what is 2FA?

Two Factor Authentication is an additional layer of security for your systems. It is a process that requires you to take an extra step (factor) to confirm you are who you claim to be when trying to log in or access a system. There are several types of "factors" that can be used, commonly, a code sent by SMS or email via a programme such as Google Authenticator or Authy.

Why do we need 2FA?

Cyber security crimes such as Phishing are sadly common place and the data you hold as a company is seen as extremely valuable to hackers. It is believed that over 50% of scam websites now have a padlock / https associated with their domain (web address) and phishing emails from banks, PayPal, and regularly used companies are becoming increasingly sophisticated and arrive in our inboxes with alarming regularity. So, it is easy to see how passwords can accidentally be compromised.

Additionally, it is not uncommon for people (staff) to use the same passwords across multiple programmes and websites (even when they are repeatedly advised against this) so it becomes very clear how vulnerable a system can become. The adding of 2FA as a standard security measure across all essential systems prevents cybercriminals using known passwords against your system.

 

Which Systems should we protect with Two Factor Authentication?

L P Networks recommends rolling out 2FA across your key systems and data storage systems wherever possible.

Speak to us about Two Factor Authentication and securing your IT infrastructure.  Call 0800 970 8980 today or email enquiries@lpnetworks.com for more information.

Business Cyber Risk Scorecard

Business Cyber Risk Scorecard

Long gone are the days of having an Anti-virus software on your device and thinking thats you covered, its now a fast moving and evolving landscape that needs constant awareness on whats happening, a multi-layered approach to protecting the business networks and data, and expert advice. 

Triangle background element
triangle background

Our experienced IT experts support businesses like yours.

Give us a call now to discuss your requirements.