Tech Terminology: Authentication

Tech Terminology: Authentication

Authentication isn’t an unfamiliar aspect in everyday life. Driver’s licenses, library cards, and PIN numbers are all forms of identity authentication. However, as computers have become a cornerstone of everyday life, the most commonly-used way to confirm one’s identity has almost assuredly become the username/password login combination. Today, we’ll take a deeper dive into what authentication is.

How Authentication Differs from Authorization
As we briefly mentioned above, authentication is simply the process of confirming that yes, someone is in fact who they claim to be. While the two are often correlated, this process is different than that of authorization, which is the process of using that confirmed identity to grant access to information or materials. This access is the real difference between the two, yet without authentication, access cannot be authorized.

How Authentication Works
When a user provides their credentials, they are compared to the credentials that are already in a database. If these credentials match, the user is then given the authorization that their identity has been assigned.

Two-Factor Authentication
In the interest of boosting security, many organizations have implemented two-factor authentication, often referred to by the shorthand 2FA. 2FA incorporates an additional factor into the authentication process beyond the typical username and password.

This process commonly involves an additional code being provided to the user via email or text message when they attempt to access the account protected by 2FA. This one-time code is required for them to get in, meaning that someone attempting to access an account also needs access to the user’s email or phone in order to successfully do so. This is why 2FA has been so widely adopted by security-minded businesses.

If you’re interested in adding another layer of protection to the business accounts that you and your users leverage, reach out by calling 978-482-2020. BNMC has the experience needed to improve your security through two-factor authentication and many other means.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, September 23 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Email Malware Hackers Business Computing Software Network Security Microsoft Internet Computer Hosted Solutions Tech Term Google IT Services Business Ransomware Mobile Devices Small Business User Tips Android Backup Smartphone Managed IT Services Cloud Computing Internet of Things Data Management IT Support Efficiency Saving Money Business Continuity Hardware Innovation Data Recovery Windows Productivity Cybersecurity Data App Data Backup Browser Communication Windows 10 Facebook Server Gmail Artificial Intelligence Managed IT Services Business Management Remote Monitoring Encryption Passwords Smartphones Productivity Microsoft Office Chrome Employer-Employee Relationship Managed Service Provider Windows 10 Phishing Analytics communications Tip of the week Applications Infrastructure Network Vulnerability Money IT Support Office 365 Disaster Recovery Word Outsourced IT Google Drive BYOD Settings Content Filtering Bandwidth Upgrade Save Money Robot YouTube Risk Management Social Media Antivirus Data storage Website Office Tips Maintenance Government IT Management Big Data Holiday Hosted Solution Business Technology Managing Stress Server Management VoIP Administration Virtual Private Network Wireless Touchscreen Mouse Alert Miscellaneous Mobile Device Workplace Tips HIPAA Apple Paperless Office Vendor Management Monitors Storage Mobile Security Two-factor Authentication Avoiding Downtime Data loss Scam Automation Unified Threat Management End of Support Business Intelligence Telephone Systems desktop Virtual Reality Spam Computing Laptop Company Culture Firewall Outlook WiFi VPN The Internet of Things SaaS Information LiFi Data Security Computing Infrastructure Professional Services Computer Care IBM Information Technology Computers Social Networking File Sharing Typing Humor Onboarding Legislation Solid State Drive Current Events Microsoft Excel Cybercrime Dark Data Chatbots eWaste Best Practice Slack SharePoint Downtime Star Wars Managed IT Smart Technology Wearable Technology Network upgrade Identity Theft Quick Tips Techology Marketing Retail Nanotechnology Development Alerts Politics USB Training Apps Corporate Profile How To Lenovo Gadgets Display Motherboard Cables Cryptocurrency Statistics Digital Signage Tablet Fraud Cost Management IT solutions Hard Disk Drive Going Green Mail Merge Blockchain Customer Service Identity Continuity Automobile Google Docs Monitoring Downloads Hacks Shortcut Distributed Denial of Service Smart Office VoIP Unified Threat Management Office Samsung Screen Reader Charging Education Dell Licensing Tech Support Dongle WannaCry Google Wallet Firefox Superfish Users Halloween Wires Cabling Bitcoin Bluetooth Troubleshooting Comparison Assessment Printing Address Permissions Chromebook Solar Google Maps Business Growth Spying Password Patch Management Managed IT Service Work Legal Analysis User Error Social Engineering Smart Tech Cooperation Websites Service Level Agreement Unified Communications Drones Customer Relationship Management Scary Stories Router Voice over Internet Protocol Windows 8 Specifications Hotspot Internet Exlporer Running Cable Compliance Hacker Heating/Cooling Employee-Employer Relationship Multi-Factor Security Break Fix IT Technicians Optimization Digital Payment Deep Learning Time Management Managed Service Printer Buisness Safety Connectivity Black Friday Virtual Desktop Staff Leominster Digital Networking Sports Remote Computing Modem FinTech Disaster Search Language Value Emergency Network Congestion Regulations Collaboration Alt Codes Servers PowerPoint Google Calendar Dark Web Mirgation Recycling Bring Your Own Device Operating System Network Management Access Control IoT Cyber Monday Wi-Fi Augmented Reality K-12 Schools Document Management Spyware Budget Writing Cookies MSP Uninterrupted Power Supply Social Unsupported Software Virtualization Update Error Computer Repair Relocation Point of Sale Ben McDonald shares Mobile Data Travel Work/Life Balance G Suite Recovery How To Health Private Cloud Supercomputer CrashOverride Staffing Black Market BDR Motion Sickness Law Enforcement Taxes Administrator Web Server what was your? Electronic Medical Records IT Budget Notifications Regulation Physical Security GPS Twitter Printers Upgrades Gadget IT Consultant Emoji Cameras Mobile Device Management Crowdsourcing Personal Information Botnet Tracking Meetings 3D Printing Cleaning Cortana CCTV Mobile Computing Machine Learning Processors Webcam

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3