Tip of the Week: Making Sure Your 2FA is A-Okay

Tip of the Week: Making Sure Your 2FA is A-Okay

Here’s the thing: even if your password policy is airtight and perfectly followed, relying on passwords alone isn’t enough anymore to secure your business. Some of today’s threats are just too capable of cracking them. In order to really preserve your business’ security, most security professionals (like us) recommend implementing two-factor authentication—however, it pays off to consider your options, and how much (if any) added security each has to offer.

For this week’s tip, let us consider the different ways to implement 2FA.

Let’s make something clear from the start:

Two-factor authentication of any kind is better than just relying on a password. After all, a password can be cracked, stolen, or guessed. Adding a second requirement for a proof of identity will prevent that from enabling access to your accounts so easily. Therefore, while some forms are often more reliable than others, two-factor authentication is always something to implement wherever possible—particularly in the workplace.

Types of Two-Factor Authentication

2FA comes in all shapes and sizes:

Text Messages

Chances are this is the form of 2FA that most people were first introduced to, as it simply requires you to provide the code that you receive to your mobile device via SMS.  This method is simple to pick up, making it easily accessible for any user and convenient. However, with the prevalence of phishing today amongst other considerations, 2FA through SMS is perhaps the least secure option, but it will still do in a pinch.


Next, we have the 2FA that functions by generating a code for the user to input into when prompted. Using these kinds of applications effectively turns a mobile device into the key for a lock, as a user isn’t going to get past the lock without access to their device. This makes the successful implementation of this form of 2FA heavily reliant on the likelihood that your users will both keep their devices charged and have them with them whenever they are needed.

Physical Devices

This variety of user authentication—where a physical token is plugged into a device or activated—has seen a resurgence in popularity in recent years, largely due to the rise in phishing attacks and other scams. While these keys come at some financial cost, they have been acknowledged as a successful and secure means of ensuring that someone is who they claim to be as they access digital resources.


Alternatively, we have also seen a rise of authentication wherein the user is the key, providing an identifier (like a fingerprint) to the scanner in order to secure access. While this form of authentication is undeniably (and sometimes literally) handy, it can be somewhat temperamental and lead to inaccuracy at times.

So, Which Type of 2FA is Best?

In simple terms: whatever kind you will actually use.

While they may not all be equally secure, any of the above options are more secure than just relying on a password alone. Data is just too valuable to be taken for granted nowadays, so if it is implemented and utilized correctly, any variety of two-factor authentication will ultimately benefit your business’ data and network security strategies.

We can help you put two-factor authentication in place, as well as any other cybersecurity measure or productivity tool your business could benefit from. Find out more about all we can do by calling 978-482-2020 today.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, June 15 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Cloud Email Software Privacy Network Security Hackers Efficiency Business Workplace Tips Computer Microsoft Data Hardware Google Hosted Solutions Malware IT Services Mobile Device Internet Communication Innovation Smartphone Mobile Devices IT Support Small Business Android Phishing Users Ransomware Cloud Computing Tech Term Backup Data Recovery Managed IT Services Cybersecurity Information Windows Smartphones Saving Money Quick Tips Outsourced IT Miscellaneous Disaster Recovery Passwords VoIP Data Backup Upgrade communications Network Browser Business Management Microsoft Office Facebook Social Media Business Continuity Windows 10 Server Collaboration Managed Service Office 365 Internet of Things Gadgets COVID-19 Productivity Managed IT Services Remote Work Data Management Apps Artificial Intelligence Windows 10 Infrastructure Information Technology Mobile Office Word Vulnerability Remote Monitoring Analytics Save Money App Gmail WiFi Chrome Managed Service Provider Router Conferencing Remote Workers Encryption Money Government Spam HIPAA Holiday Settings BYOD Tip of the week Applications Google Drive Remote Display Compliance Networking Company Culture Website VPN Employer-Employee Relationship Access Control Data Security Automation Virtual Reality Paperless Office IT Support Wi-Fi Operating System Unified Threat Management Social Computers Virtualization BDR Avoiding Downtime Bandwidth Antivirus Maintenance Content Filtering Firewall YouTube Document Management Education Employee-Employer Relationship Apple Managed Services Risk Management Wireless Robot Storage Office Tips IT Management Business Technology End of Support Virtual Private Network Hacker Data storage Development Big Data Computing Data loss Cybercrime Bring Your Own Device Vendor Downtime LiFi Budget Telephone Systems Marketing Mobile Security Hosted Solution Two-factor Authentication Humor desktop Administration Patch Management Managed IT Service Best Practice Retail iOS Alert Customer Relationship Management Scam Mouse Business Intelligence Cryptocurrency Going Green Break Fix Search Vendor Management Monitors Solid State Drive Chromebook Regulations Printing Identity Theft Password Training OneNote Augmented Reality MSP Hard Disk Drive Data Breach IT Managing Stress Server Management Social Network Free Resource Laptop Touchscreen Windows 7 Managed IT The Internet of Things Software as a Service Remote Computing How To Tablet Blockchain SaaS Images 101 Outlook Screen Reader Charging Shortcut Distributed Denial of Service Digital Signage Data Warehouse Gig Economy Smart Office VoIP Unified Threat Management Writing Entertainment Comparison Monitoring Solid State Drives Reviews Licensing Dongle Firefox Superfish Shortcuts Mobile Management Payment Card Wires Bluetooth Employee-Employer Relationships PCI DSS Assessment Address Permissions Digital Payment Dark Data Streaming Update Processor Logistics 2FA Solar Typing Smart Tech Current Events Digital Troubleshooting Business Analysis FBI Work User Error Meetings Disaster Hybrid Cloud Specifications Spying National Security Politics Cooperation Service Level Agreement Security Cameras Profiles Inventory Voice over Internet Protocol Analysis Students Work/Life Balance Battery Hotspot Internet Exlporer Customer Service Human Error Memory Asset Management Workstation Halloween Heating/Cooling Multi-Factor Security Connectivity IT solutions Spyware Health Virus Private Cloud K-12 Education IT Technicians Optimization Time Management Printer Google Docs Uninterrupted Power Supply Office Scalability Samsung Peripheral Hacks Black Friday Computer Care IBM Updates Tech Support user treats Staff Leominster File Sharing Utility Computing Shadow IT Modem FinTech Mixed Reality Files Language Value Emergency Google Wallet Device Reducing Cost Memes Scary Stories Servers Bitcoin Google Calendar Management IoT Dark Web LED Threats Instant Messaging Running Cable Mirgation Recycling Network Management Business Growth Social Engineering Migration Consulting Cyber Monday Corporate Profile PowerPoint Websites Shopping K-12 Schools Legal Laptops Twitter Gamification Buisness Cookies G Suite RMM Virtual Desktop Computing Infrastructure Professional Services Unified Communications Drones Automobile Mobility Batteries Sports Social Networking Windows 8 Legislation Policy Star Wars Microsoft Excel Co-Managed IT Chatbots eWaste SharePoint Dell Safety Mobile Device Management Smart Technology WannaCry Onboarding GDPR Employees Wearable Technology Network upgrade Deep Learning Techology Cabling Managed Services Provider Nanotechnology Slack Hard Disk Drives Banking Alerts USB Lenovo Google Maps Network Congestion Print Toner Myths Holidays Motherboard Cables Statistics Messaging Procedure Fraud Cost Management Mail Merge Content Huawei Distribution Identity Continuity Alt Codes Downloads Mobile Computing GPS Machine Learning Processors IT Consultant Unsupported Software Cameras Regulation Tracking Computer Repair Relocation Cleaning Mobile Data How To Recovery CCTV Printers Webcam Black Market Law Enforcement Error Electronic Medical Records Point of Sale Ben McDonald shares Notifications Physical Security Travel Upgrades Gadget Emoji Supercomputer CrashOverride Financial Crowdsourcing Staffing Personal Information Botnet Motion Sickness Taxes 3D Printing Administrator Cortana IT Budget Web Server what was your?

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3