Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Two Steps Are Better Than One, Where Security Is Concerned

Two Steps Are Better Than One, Where Security Is Concerned

You’re lucky to go a month without seeing news of some devastating data breach. With more businesses gearing up for the worst, what are you doing to protect your organization’s intellectual property and sensitive data? You can start by implementing a new type of authentication system that’s much more secure than your current security strategy--two-factor authentication.

It’s no secret that a password is no longer as secure as it used to be. Advanced technology used by hackers can crack even the most secure passwords with enough time. This is because many users tend to opt for passwords that are either easy to guess, not complex enough, or are simply quite obvious for one reason or another. We’ll walk you through some of the common scenarios that you might encounter for password security, and how two-factor authentication can solve it.

For example, many users have to change their passwords so frequently that they may be mind-boggled about how to remember each and every one of them. Proper passwords should be at least 12 characters long, including special characters, both upper and lower-case letters, numbers, and symbols. The best way to approach building a password is to include all of this information in a seemingly random string, but users will often try to use something that they will remember--information that can often be stolen during a hacking attack, or found on social media.

What if you use your first-born’s name in your password? That’s information that could easily be found in public records. The same can be said for the name of your parents, which school you went to, and even your favorite TV show via social media. Thanks to the Internet, hackers have all of the tools they need to find plenty of information about you--information that you might subconsciously be using either as a security question or for a password.

Therefore, if you are taking advantage of a complex password, it makes sense from a logical standpoint that you would only want to remember one of those, at most, at any given time. Unfortunately, this has a negative side-effect on security, because if a hacker gains access to one account through the password, they will have access to all of your accounts through the password.

Password managers make it easier to remember complex passwords, but the issue remains the same. If a hacker has access to your password, what keeps them from accessing your accounts? Two-factor authentication is the answer. Two-factor authentication essentially adds a secondary level of security to any online account or network access point. Where you once may have needed only a password, you’ll now have to use some sort of secondary credential, be it a mobile device or an email to a secondary account. It’s just one small way you can protect your organization, and it doesn’t take long to set up.

Does your organization need help setting up two-factor authentication? To learn more, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 18 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Email Malware Hackers Business Computing Microsoft Hosted Solutions Internet Software Ransomware Computer IT Services Network Security Windows Google Windows 10 Backup Business Smartphone Business Continuity Innovation Android App Hardware Small Business Data Management Data User Tips Remote Monitoring Browser Internet of Things Saving Money Mobile Devices IT Support Cloud Computing Productivity Phishing Managed IT Services Tip of the week Office Tips Data storage Gmail Outsourced IT Big Data Smartphones Facebook Office 365 Efficiency Risk Management Artificial Intelligence Word Productivity Data Recovery Robot Cybersecurity Google Drive Settings Upgrade IT Support Microsoft Office Maintenance Vulnerability Disaster Recovery Money Outlook Monitors Passwords Save Money IT Management Mobile Device LiFi Virtual Private Network Managed Service Provider Mouse Miscellaneous Administration Content Filtering Apple SaaS Telephone Systems Analytics Alert Antivirus Network Encryption Computing Employer-Employee Relationship Chrome Hosted Solution Server End of Support Workplace Tips Windows 10 Unified Threat Management YouTube Managed IT Services communications Social Media Disaster Website Scam Customer Relationship Management Drones Heating/Cooling Hacker Multi-Factor Security Unified Communications Sports Display Uninterrupted Power Supply Networking The Internet of Things Servers Alt Codes IBM Computer Care Google Calendar Wireless VPN Data Security VoIP Budget Cybercrime Server Management Humor Typing Corporate Profile Training WiFi Legislation Automobile Automation Marketing Current Events Dell Techology Quick Tips Statistics Cryptocurrency WannaCry Tablet Virtual Reality Google Maps Mail Merge Communication Going Green Unified Threat Management VoIP Bluetooth Storage Bitcoin Data loss IT solutions Address Writing Printing desktop User Error Avoiding Downtime Legal Politics Running Cable Dark Data Windows 8 Digital Firewall Collaboration Buisness Data Backup Retail Virtual Desktop Printer Samsung Time Management Laptop Search Customer Service Spyware Deep Learning File Sharing Emergency Office Operating System Solid State Drive Access Control Vendor Management Network Management Websites Social Spam Bring Your Own Device Downtime Business Technology Social Engineering Information Technology Touchscreen Best Practice Hard Disk Drive SharePoint Managed IT Gadgets Cabling Lenovo Safety Google Docs Bandwidth Downloads Government Apps Halloween Shortcut Network Congestion Users Hacks How To Infrastructure Superfish Google Wallet Business Growth Education Two-factor Authentication BYOD Scary Stories Patch Management Computers Password Firefox Digital Payment Meetings Cleaning Computer Repair Work/Life Balance Private Cloud Mobile Device Management Webcam How To Health Law Enforcement Black Market Error Mobile Computing Ben McDonald shares Point of Sale Gadget Electronic Medical Records Twitter Paperless Office Upgrades Staffing Remote Computing Administrator what was your? Web Server 3D Printing Processors Holiday GPS Comparison Business Management Cameras Unsupported Software Tracking Specifications Update CCTV Mobile Data Recovery Tech Support Document Management Black Friday Notifications Cyber Monday Chromebook Identity Theft Travel G Suite Physical Security Crowdsourcing Emoji Botnet CrashOverride Supercomputer Motion Sickness Taxes Personal Information Cortana Machine Learning IT Budget IT Consultant Wi-Fi Virtualization Relocation

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3