Cracking Multi-Factor Authentication Requires A Lot More Than Guessing A Password

Cracking Multi-Factor Authentication Requires A Lot More Than Guessing A Password

When discussing identity authentication when IT is concerned, the use of passwords is most likely the first thing to pop into one’s mind. However, there are other methods of authentication that may be combined with the use of a password to increase security. This practice is known as Multi-Factor Authentication, or MFA, although it is also called Two-Factor Authentication, or 2FA.

The Factors That Are Used for Authentication
MFA/2FA relies on ascertaining the identity of the individual attempting to log in by utilizing methods that fall into one of three categories, most often from at least two of these categories:

  • Something they know: including passwords, usernames, and PIN numbers.
  • Something they have: such as a one-time code that is received via a specialized application or through an email message, a physical token that grants them access, or even the SIM card of their phone.
  • Something they are: for example, the use of fingerprints, voice recognition, or other biometric authentication methods.

By combining these methods, it becomes much more difficult for a network or data storage to be accessed by someone who should not do so. These methods may be combined in various ways in order to protect a business’ assets.

Why MFA Is Important
Taking recent security events into consideration, the importance of adding more security than a username and password to your critical files has never been more clear. When databases containing hundreds of username/password combinations are being breached, requiring an additional form of authentication is an excellent way to secure your critical data and prevent it from being accessed by someone without the proper clearance.

MFA in Action
As one might assume, there are many ways that the numerous methods of providing authentication may be combined to ensure security.

Most commonly, the first step to access a business network is to log onto a workstation, which requires a password and username. Occasionally, this step will also require a biometric method before allowing the user access. From there, in order to access the network, the user may be required a few different forms of authentication. These could range from a secondary password delivered via a password manager to a generated, one-time password delivered via mobile device.

By combining these steps, a MFA/2FA strategy takes shape to better protect your business from unwanted entry.

Of course, we’ve only scratched the surface of how MFA/2FA can be leveraged to secure your business. Reach out to us at Network Management, Inc. for more information how to protect your business using multi-factor authentication. Give us a call at (703) 848-9000.

A Quick Look at Professional Services Management S...
Why Boarding Pass Selfies Are A Really Bad Idea
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, March 23 2019

Captcha Image

Contact Us

Learn more about what Network Management, Inc. can do for your business.

Call Us Today
Call us today
(703) 848-9000

8229 Boone Blvd.
Suite 250

Vienna, Virginia 22182

Latest Blog

Chances are, your employees aren’t going to be able to just sit down and immediately begin using your business’ technology solutions. This is one reason why employee training is an invaluable investment of time. Let’s discuss some others....

Account Login

TOP