multi-factor authentication

Authorization and verification protected logins and peace of mind

decorative circles
decorative circles
isometric illustration of job posting

what is multi-factor authentication?

Multi-Factor Authentication is one of the most essential security controls you can implement today. Multi-Factor Authentication is a security feature that requires additional authentication methods to be provided by your user when logging into your system. One example is sending a one-time password to a mobile device when someone logs into an online account using their credentials.

Multi-Factor Authentication adds an extra layer of security by requiring additional identity verification before granting access to your network. Adding multi-factor authentication is an effective method of keeping your user accounts secure with minimal inconvenience for your users.

team getting authenticated on both a computer and a phone

why is multi-factor authentication important?

team standing around a bunch of authentication documents

When people talk about cybersecurity, they often focus on protecting against malware, viruses, and hackers. These threats are real, but there are plenty of other ways companies can become victims of cybercrime. One way businesses fall victim to fraud is through phishing attacks. Phishing attacks involve sending emails that impersonate legitimate organizations to steal personal information. For example, scammers could pretend to be PayPal and ask you to log into your account and update payment methods. Once you provide the info, the scammer can take over your account and drain your bank accounts.

Another common type of attack happens when someone gains unauthorized access to a computer system. For example, this could occur when a hacker breaks into a server or steals a password. Or it could happen when a person shares his or her login credentials with a friend or coworker. Either way, once the attacker gets control of the computer, he or she can do anything from deleting files to installing malicious software programs.

MFA addresses both types of attacks. A traditional username/password combo won't work when someone hacks into your PC, but it won't stop an email scam either. With MFA, however, attackers must possess a username and password and additional verification factors, such as a phone number or physical token. If they try to break in without those two pieces of proof, they'll be denied access to systems.

when should i use multi-factor authentication?

MFA is useful for almost any situation where you'd typically use a username/password combination to log into a computer or application. The best place to start implementing MFA is at the point of entry into your organization's network. This includes all equipment connected to your internal network and any computer, tablet, phone, or other mobile device connected to your internal network. You may also consider adding MFA to your email account if you have not already done so, as this is a vector that hackers use to gain access to information used to steal user identities and impersonate a verified employee.

man pointing to a profile on a web window

start securing your company today

As leaders in cybersecurity, we're especially well suited to implementing this kind of security for your business. iTecs is partnered with Duo, a branch of Cisco Secure. We utilize Duo Push, Verified Duo Push, and Duo Passwordless Authentication, among other tools to give your company the peace of mind of knowing that your IT infrastructure is protected from cyber threats.

An iTecs Professional can help determine where MFA fits into your security strategy and how to implement it. Contact us today!