Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Two Steps Are Better Than One, Where Security Is Concerned

Two Steps Are Better Than One, Where Security Is Concerned

You’re lucky to go a month without seeing news of some devastating data breach. With more businesses gearing up for the worst, what are you doing to protect your organization’s intellectual property and sensitive data? You can start by implementing a new type of authentication system that’s much more secure than your current security strategy--two-factor authentication.

It’s no secret that a password is no longer as secure as it used to be. Advanced technology used by hackers can crack even the most secure passwords with enough time. This is because many users tend to opt for passwords that are either easy to guess, not complex enough, or are simply quite obvious for one reason or another. We’ll walk you through some of the common scenarios that you might encounter for password security, and how two-factor authentication can solve it.

For example, many users have to change their passwords so frequently that they may be mind-boggled about how to remember each and every one of them. Proper passwords should be at least 12 characters long, including special characters, both upper and lower-case letters, numbers, and symbols. The best way to approach building a password is to include all of this information in a seemingly random string, but users will often try to use something that they will remember--information that can often be stolen during a hacking attack, or found on social media.

What if you use your first-born’s name in your password? That’s information that could easily be found in public records. The same can be said for the name of your parents, which school you went to, and even your favorite TV show via social media. Thanks to the Internet, hackers have all of the tools they need to find plenty of information about you--information that you might subconsciously be using either as a security question or for a password.

Therefore, if you are taking advantage of a complex password, it makes sense from a logical standpoint that you would only want to remember one of those, at most, at any given time. Unfortunately, this has a negative side-effect on security, because if a hacker gains access to one account through the password, they will have access to all of your accounts through the password.

Password managers make it easier to remember complex passwords, but the issue remains the same. If a hacker has access to your password, what keeps them from accessing your accounts? Two-factor authentication is the answer. Two-factor authentication essentially adds a secondary level of security to any online account or network access point. Where you once may have needed only a password, you’ll now have to use some sort of secondary credential, be it a mobile device or an email to a secondary account. It’s just one small way you can protect your organization, and it doesn’t take long to set up.

Does your organization need help setting up two-factor authentication? To learn more, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Software Business Computing Internet Microsoft Hosted Solutions Ransomware Android IT Services Business Network Security Google Computer Backup Smartphone Mobile Devices Windows Windows 10 Innovation Small Business Data Management Browser Internet of Things App Artificial Intelligence Hardware Encryption Cloud Computing Server Data Business Continuity Outsourced IT User Tips Smartphones Data Recovery Managed Service Provider Office 365 Efficiency Saving Money Tip of the week Business Management Remote Monitoring IT Support Productivity Phishing Managed IT Services Gmail Antivirus Data storage Money Big Data Facebook Windows 10 Communication Risk Management Vulnerability Word Productivity Settings Robot Chrome IT Management Cybersecurity Google Drive Upgrade IT Support Infrastructure Office Tips Microsoft Office Data Backup Maintenance Disaster Recovery HIPAA Passwords Mobile Security Outlook Monitors Save Money LiFi Business Technology Mobile Device Automation Administration Content Filtering Mouse Virtual Reality Miscellaneous Analytics Apple Holiday SaaS Storage Data loss Telephone Systems Two-factor Authentication Alert Scam Firewall Network Computing VPN Data Security Employer-Employee Relationship Hosted Solution Server Management Virtual Private Network Workplace Tips End of Support Bandwidth Government YouTube communications Social Media Unified Threat Management BYOD Managed IT Services Unified Communications Drones Sports Disaster Specifications Fraud Hacker The Internet of Things Printer Display Time Management Black Friday Search Uninterrupted Power Supply Computer Care Emergency IBM Alt Codes VoIP Network Management Cybercrime Wireless Applications Access Control WiFi Cyber Monday Budget Marketing Training Hotspot Humor Corporate Profile Typing Touchscreen Current Events IT Technicians Automobile SharePoint Smart Technology Managed IT Dell Paperless Office Language Lenovo WannaCry Cryptocurrency Going Green Google Maps Mirgation Remote Computing Downloads IT solutions Distributed Denial of Service Shortcut Computing Infrastructure Superfish Bitcoin Printing Running Cable Chatbots Writing Managed IT Service Patch Management Legal Buisness desktop Alerts Politics Dark Data Virtual Desktop Customer Relationship Management Digital Windows 8 Heating/Cooling Laptop Identity Collaboration Multi-Factor Security Retail Break Fix Samsung Deep Learning Document Management Licensing Tech Support Networking Customer Service Spyware Office Spam Servers Tech Term File Sharing Google Calendar Dark Web Vendor Management Bring Your Own Device Operating System Downtime Solid State Drive Social Identity Theft Cooperation Websites Social Engineering Information Technology Gadgets Compliance Legislation Microsoft Excel Hard Disk Drive Best Practice Staff Techology Quick Tips Safety Apps Statistics Halloween Cabling Users Regulations Tablet Blockchain Mail Merge Google Docs How To Hacks Augmented Reality Unified Threat Management Network Congestion Education VoIP Bluetooth Google Wallet Scary Stories Comparison Permissions Wi-Fi Address Website Business Growth Firefox Password Digital Payment Wearable Technology User Error Computers Avoiding Downtime Meetings Cleaning Work/Life Balance Computer Repair Mobile Device Management Private Cloud How To Webcam Law Enforcement Health Mobile Computing Error Black Market Ben McDonald shares Point of Sale Gadget Electronic Medical Records Twitter Upgrades Staffing Administrator Processors 3D Printing what was your? Web Server GPS Unsupported Software Cameras Tracking Update Mobile Data CCTV Recovery Notifications Chromebook Travel Crowdsourcing Physical Security G Suite Supercomputer Botnet Emoji CrashOverride Motion Sickness Personal Information Taxes IT Budget Machine Learning Cortana IT Consultant Relocation Virtualization

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3