Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

According to Study, Only 28% Utilize Two-Factor Authentication

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.

Using data from Survey Sampling International, the researchers at Duo Labs created a survey to determine the adoption rate of 2FA. This survey was designed to mimic patterns throughout different regions to give an impression of how much 2FA was adopted, and was also targeted to a sample that was created to be proportional to the entire US population. The results of this survey provided some invaluable insights.

However, a few insights were more surprising than others. For example, only 28% used 2FA, and under half of all participants had ever heard of 2FA before taking the survey.

Yet of those who had heard of 2FA, 54% had adopted it voluntarily, and only 20.8% had first used it in their work environments. Considering the number of applications and services that encourage users to utilize 2FA as a security measure, these relatively high numbers make sense. What makes less sense is the fact that the researchers found that less than half of these voluntary adopters used 2FA at every opportunity.

Despite this, some of the survey’s results were a little more positive for the future of 2FA. Analysis of the current state of 2FA has shown a shift in how users authenticated their identities between 2010 and 2017, that shift indicating a reliance on more secure, safer methods. Hard tokens, or physical devices that a user carries to confirm their identity, have seen a decrease in use of about 50% in the time covered by this analysis. These tokens are relatively insecure, as they only need to be lost or stolen to potentially undermine the use of 2FA, so this decrease in their use shows an increase in security awareness and risk management.

Perhaps most importantly, this research provides real insights into the behavior of the user, and what they considered the most important reason to use certain 2FA methods.

Most users indicated that when they compared different approaches to 2FA, they held simplicity and convenience as their most important factors. This helps to explain why 84% of respondents ranked security tokens as the most trustworthy form of 2FA., when the security risks and issues are (as referenced above) well-known by users.

Still, the saddest truth revealed by this survey is that too few users utilize 2FA as they secure their devices, both personal and work related. Hopefully, the repeated security breaches and cyberattacks will help to change that, as the very real risk of data loss and how network security can prevent it is pushed further into the public consciousness.

The question now becomes, are your business’ resources protected by 2FA? If you want professional assistance in implementing it, and other critical security needs, give BNMC a call at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Software Business Computing Internet Ransomware Microsoft Hosted Solutions Network Security Android IT Services Business Google Mobile Devices Computer Backup Smartphone Windows Windows 10 Innovation Data Management Small Business Business Continuity Browser Internet of Things Cloud Computing Data App Artificial Intelligence Hardware Encryption Server Phishing Tip of the week Office 365 Gmail Remote Monitoring IT Support Business Management Smartphones Managed Service Provider Efficiency Managed IT Services Saving Money User Tips Productivity Data Recovery Outsourced IT Communication Windows 10 Office Tips Vulnerability Big Data Robot IT Management Google Drive Word Facebook Upgrade Productivity Cybersecurity Risk Management Antivirus Data storage IT Support Infrastructure Money Chrome Settings Miscellaneous Virtual Reality Bandwidth Workplace Tips Apple SaaS Storage YouTube Mobile Device Two-factor Authentication Social Media communications Scam Data loss Holiday Disaster Recovery Telephone Systems Computing VPN Alert Passwords Data Security Firewall Server Management LiFi Virtual Private Network End of Support Administration Content Filtering Employer-Employee Relationship Analytics Microsoft Office Data Backup Government HIPAA Unified Threat Management Network Outlook BYOD Managed IT Services Mobile Security Monitors Save Money Business Technology Maintenance Automation Hosted Solution Mouse Computer Care Lenovo Cryptocurrency IBM Language Mirgation Remote Computing Wireless Downloads Going Green Halloween Users Distributed Denial of Service Apps Shortcut Computing Infrastructure Training Superfish Bitcoin Corporate Profile Chatbots Writing Automobile Education Printing Patch Management Legal Scary Stories Dell Managed IT Service Paperless Office Alerts Dark Data Website Customer Relationship Management Windows 8 WannaCry Identity Google Maps Multi-Factor Security Retail Heating/Cooling Sports Break Fix Unified Communications Licensing Networking Customer Service Tech Term Google Calendar Office Servers The Internet of Things Operating System desktop Dark Web Vendor Management Digital Cooperation Politics Social VoIP Cybercrime Compliance Legislation Social Engineering Collaboration WiFi Information Technology Samsung Best Practice Marketing Microsoft Excel Spyware Staff Document Management Techology Tech Support Quick Tips Regulations Tablet Safety File Sharing Statistics Mail Merge Google Docs Solid State Drive Blockchain Augmented Reality Identity Theft Unified Threat Management Network Congestion Websites VoIP Hacks Comparison IT solutions Bluetooth Google Wallet Address Business Growth Hard Disk Drive Permissions Wi-Fi Wearable Technology User Error Computers Avoiding Downtime Password Running Cable Cabling Specifications Drones Buisness Hacker Fraud How To Printer Display Virtual Desktop Time Management Laptop Black Friday Search Deep Learning Emergency Alt Codes Firefox Applications Digital Payment Access Control Network Management Disaster Cyber Monday Spam Budget Bring Your Own Device Humor Downtime Typing Hotspot IT Technicians SharePoint Touchscreen Current Events Gadgets Uninterrupted Power Supply Smart Technology Managed IT Law Enforcement Error Ben McDonald shares 3D Printing Point of Sale Gadget Unsupported Software Update Staffing Administrator Processors what was your? Mobile Data Web Server Recovery GPS Cameras Chromebook Tracking CCTV Physical Security Emoji Notifications Personal Information Cortana Travel G Suite Crowdsourcing CrashOverride Virtualization Supercomputer Botnet Motion Sickness Taxes Computer Repair IT Budget Machine Learning Mobile Device Management How To IT Consultant Health Black Market Relocation Mobile Computing Meetings Cleaning Work/Life Balance Electronic Medical Records Twitter Private Cloud Upgrades Webcam

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3