Tech Terminology: Authentication

Tech Terminology: Authentication

Authentication isn’t an unfamiliar aspect in everyday life. Driver’s licenses, library cards, and PIN numbers are all forms of identity authentication. However, as computers have become a cornerstone of everyday life, the most commonly-used way to confirm one’s identity has almost assuredly become the username/password login combination. Today, we’ll take a deeper dive into what authentication is.

How Authentication Differs from Authorization
As we briefly mentioned above, authentication is simply the process of confirming that yes, someone is in fact who they claim to be. While the two are often correlated, this process is different than that of authorization, which is the process of using that confirmed identity to grant access to information or materials. This access is the real difference between the two, yet without authentication, access cannot be authorized.

How Authentication Works
When a user provides their credentials, they are compared to the credentials that are already in a database. If these credentials match, the user is then given the authorization that their identity has been assigned.

Two-Factor Authentication
In the interest of boosting security, many organizations have implemented two-factor authentication, often referred to by the shorthand 2FA. 2FA incorporates an additional factor into the authentication process beyond the typical username and password.

This process commonly involves an additional code being provided to the user via email or text message when they attempt to access the account protected by 2FA. This one-time code is required for them to get in, meaning that someone attempting to access an account also needs access to the user’s email or phone in order to successfully do so. This is why 2FA has been so widely adopted by security-minded businesses.

If you’re interested in adding another layer of protection to the business accounts that you and your users leverage, reach out by calling 978-482-2020. BNMC has the experience needed to improve your security through two-factor authentication and many other means.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, November 18 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Hackers Business Business Computing Network Security Software Computer Internet Microsoft IT Services Google Hosted Solutions Ransomware Tech Term Efficiency Mobile Devices User Tips Android Communication Backup Data Managed IT Services Smartphone Small Business Saving Money Cloud Computing Business Continuity Productivity Hardware Browser Innovation Windows 10 Windows Data Recovery IT Support Internet of Things Data Management Managed IT Services App Data Backup Cybersecurity Productivity Business Management Workplace Tips Office 365 Word Artificial Intelligence Gmail Microsoft Office Remote Monitoring Disaster Recovery Encryption Passwords Upgrade Server Facebook Phishing Windows 10 Analytics communications Tip of the week Outsourced IT Website Network BYOD Money Employer-Employee Relationship Vulnerability IT Support Applications Smartphones Chrome Infrastructure Managed Service Provider Company Culture Maintenance YouTube Government Risk Management Social Media Antivirus Data storage Office Tips Mobile Device Big Data IT Management Robot Google Drive Save Money Settings Content Filtering Bandwidth Miscellaneous End of Support Telephone Systems Managed Service Virtual Reality Apple Education desktop Users Storage Firewall Information SaaS Two-factor Authentication Managing Stress Avoiding Downtime Scam Holiday Development Wireless Alert Display Laptop HIPAA Outlook Spam Computing The Internet of Things Operating System WiFi Mobile Security LiFi VPN Paperless Office Access Control Monitors Vendor Management Data Security VoIP Hosted Solution Server Management Business Technology Administration Mouse Virtual Private Network Business Intelligence Touchscreen Automation Data loss Unified Threat Management Statistics Tablet Staff Leominster Device Google Docs How To Lenovo Modem FinTech IT solutions Going Green Downloads Language Value LED Digital Payment Safety Mail Merge Blockchain Regulations Hacks IoT PowerPoint Google Wallet Digital Shortcut Remote Computing Distributed Denial of Service Halloween Mirgation Recycling Bitcoin Disaster VoIP Unified Threat Management Network Congestion Bluetooth Comparison Augmented Reality K-12 Schools Business Growth Collaboration Firefox Superfish Cookies MSP Printing Computing Infrastructure Professional Services Co-Managed IT Legal Address Permissions Social Networking Password Star Wars Onboarding Unified Communications Drones Document Management Writing Spyware Patch Management Managed IT Service Scary Stories Chatbots eWaste Windows 8 Uninterrupted Power Supply Wi-Fi User Error Computer Care Computers IBM Specifications Running Cable Wearable Technology Network upgrade Hacker File Sharing Customer Relationship Management Nanotechnology Slack Dark Data Solid State Drive Heating/Cooling Update Multi-Factor Security Alerts USB Content Deep Learning Buisness Motherboard Cables Mobile Device Management Virtual Desktop Fraud Cost Management Digital Signage Identity Theft Retail Break Fix Sports Identity Continuity Time Management Printer Training Corporate Profile Search Black Friday Smart Office Alt Codes Networking Politics Screen Reader Monitoring Charging Customer Service Hard Disk Drive Servers Google Calendar Licensing Dongle Streaming Bring Your Own Device Automobile Emergency Wires Assessment Troubleshooting Budget Office Samsung Dark Web Solar Social Dell Network Management Information Technology WannaCry Cyber Monday Work Typing Humor Cabling Tech Support Smart Tech Spying Chromebook Legislation Cybercrime Cooperation Service Level Agreement Human Error Best Practice Google Maps Downtime Router Analysis Voice over Internet Protocol Current Events Hotspot Internet Exlporer Social Engineering Microsoft Excel Marketing Compliance SharePoint Apps Managed IT Smart Technology Gadgets IT Technicians Optimization Cryptocurrency Quick Tips Techology Websites Connectivity Employee-Employer Relationship IT Consultant Emoji Upgrades Gadget Crowdsourcing Cameras Tracking Meetings Personal Information Botnet Cleaning Cortana 3D Printing CCTV Processors Webcam Machine Learning Virtualization Unsupported Software Error Point of Sale Ben McDonald shares Computer Repair Relocation Travel Mobile Data G Suite Recovery How To Work/Life Balance BDR Mobile Computing Supercomputer CrashOverride Health Private Cloud Staffing Black Market Motion Sickness Regulation Taxes Administrator Law Enforcement Printers IT Budget Notifications Web Server what was your? Electronic Medical Records GPS Twitter Physical Security

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3