Cloud Security

Multi-Factor Authentication

Improve the security of all your accounts by using MFA

Most accounts have the ability to turn on multi factor authentication (sometimes called two factor authentication, 2FA, or MFA). This improves the security of the login and makes it much harder for someone to use a stolen password.

Your company is at risk if you continue to solely rely on a username and password for security. This kind of security just checks that the user has the correct login details; it does not verify that the person accessing the system is truly who they claim to be. The password might have been stolen, cracked, or glimpsed over someone else’s shoulder.

Multi Factor Authentication Explained

Multi-factor authentication is the technique of using an extra piece of information, combined with the usual login and password details to access an account, online service, or device. A code delivered by SMS, a one-time code produced by an app on your phone, or a physical object like a USB could all be used for this.

Why You Should Use Multi-Factor Authentication?

Any service, account, or device which uses multi factor authentication is more secure. This is because even if an attacker had your login and password, they would still not be able to access your account if it MFA enabled. They would require those login details plus physical access to your mobile device or USB key in order to get entry.

MFA codes nearly always have a time limit. This means that in order to gain access to your account, a hacker would not only need to physically control your device, but also to have that device in their hand at the exact time of their login attempt.

How To Use Multi Factor Authentication

There are three main methods which are used for MFA.

  • Generate A One-Time Code With An App
    We advise using a specialised tool like Google Authenticator or Microsoft Authenticator for MFA. Every 30 seconds, you can generate a brand-new, exclusive code with these. These MFA authentication apps provide the most secure type of multi-factor authentication and are compatible with a wide range of web-based programmes and services.
  • USB Device
    This method is more frequently used to acquire access to hardware gadgets or software that is already installed on your computer. The USB key functions similarly to the keys to your house. You cannot access a locked device unless you insert it into the USB port. The benefit of using a UBS key for MFA is that it is virtually impossible to circumvent or fake. The drawback is that if you lose your USB key, you’ll be locked out of your device until a replacement arrives.
  • SMS
    With this approach, a code is sent via SMS when you try to log in. You have a short window of time after receiving the SMS to enter the code and confirm your login.The simplicity of this procedure makes it the easiest to use of the three. But because it’s the simplest, it’s also the least secure because a hacker might clone your SIM card and get the texts in place of you. This makes SMS a good MFA for day to day users but not a good method for businesses to use.
    The advantage of this method is that is the simplest of the three. However, being the easiest, it is also the least secure, as a hacker could clone your SIM card and receive the text messages instead, or they could call up your mobile phone provider and trick them into forwarding your texts to a new number by impersonating you.

How Carden IT Services Can Help You

We can assist you in setting up MFA for your accounts and devices.

Our managed cybersecurity services include multi factor authentication implementation as a standard. Speak to our experts right away if you want to secure the hardware and software in your company.

Implementing multi factor authentication is a key part of our managed cyber-defence services. If you’d like to secure your business’s technology, speak to our team today.

Want To Know More?

Contact Our Experts

    Send Us A Message

      Send Us A Message