XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

Researchers at Duo Labs, using data compiled by Survey Sampling International, designed a survey that would mimic the patterns that could potentially be seen in different regions concerning the adoption rate of 2FA. The results of this survey were striking, as they revealed that only 28% of those surveyed--designed to match up to the entirety of the US population--had adopted 2FA. Over half of the participants had never even heard of 2FA before the survey was administered.

The researchers were also surprised to find that, of those who knew about 2FA, 54% were voluntary adopters, and only 20.8% had been introduced to 2FA in their work environments. However, reflecting upon the number of applications and services that now prompt users to set up some form of 2FA, this is hardly surprising. Yet despite the relatively high number of voluntary adopters, less than half of these respondents used 2FA wherever they could.

However, there were a few results that showed a bit more hope for the utilization of 2FA. First of all, an analysis of the state of 2FA that compares the authentication options in 2010 to those in 2017, shows that more people are relying on more secure methods. For instance, the use of hard tokens (or a physical device used to confirm the bearer’s identity) decreased by half in the span of time the analysis covered. This indicates an increased awareness in the potential security risks that a hard token presents--all it would take is for one of these tokens to be lost or stolen to render 2FA ineffective.

The real takeaway from the results of this research is an insight into user behavior. Namely, convenience and simplicity were important factors when a user formed an opinion of the different approaches to authentication. This helped to contribute to security tokens being ranked as the most trustworthy form of 2FA by 84% of respondents. While there was an awareness that these tokens had their issues (including the risk of losing them, as referenced above) there was still a demonstrated trust in their reliability.

Despite all this, the sad truth persists that too few people are utilizing 2FA to secure their personal and business devices. With any luck, this will change in the near future, as network security has been thrust further into the public consciousness due to the repeated breaches and attacks that have made headlines as businesses rely more heavily on computing resources.

Do you have 2FA in place to protect your business resources? For help implementing it and other crucial security measures, reach out to XFER at 734-927-6666 / 800-Get-XFER.

Tip of the Week: How to Type Accent Marks and Symb...
11 Ways to Enhance Android Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Data Small Business Hosted Solutions Mobile Devices Productivity Hardware Google Mobile Office VoIP Email Gadgets Malware Quick Tips Network Security Network Efficiency IT Support Innovation Social Media Business Management IT Services Business Continuity Smartphones Miscellaneous Upgrade Server Virtualization Business Communication Windows Disaster Recovery Computer Managed IT Services Microsoft Office Communications Data Backup User Tips Users Passwords Mobile Device Management Browser Android Save Money Smartphone Marketing Ransomware Alert WiFi Data Recovery Holiday Vendor Management Tech Term Outsourced IT Mobile Computing Cybercrime Operating System Windows 10 Internet of Things Remote Monitoring Computers BDR Bring Your Own Device Apple BYOD Cloud Computing Information Technology Avoiding Downtime Chrome Router Telephone Systems Automation Big Data Current Events Remote Computing Going Green History IT Solutions Best Practice The Internet of Things Artificial Intelligence VPN Firewall Wireless Technology Spam Collaboration Hacking IT Consultant Health Cybersecurity Social Engineering Trending Employer-Employee Relationship Phone System Facebook Application Lithium-ion Battery Managed IT Services Proactive IT Bandwidth Office Excel App Budget Printer Money Content Filtering Business Managament Business Intelligence Fax Server Maintenance How To Networking Windows 8 Applications Unified Threat Management Two-factor Authentication Windows 10 Mobility iPhone Recovery Outlook Tutorials Virus Data Security Antivirus Private Cloud Website Apps Redundancy Analytics Law Enforcement Gmail Office 365 Productivity PowerPoint Phishing Value User Error Sports Customer Relationship Management Hard Drives Training Data Protection Managed IT Mouse Humor Streaming Media Risk Management Word Save Time Identity Theft Administration Office Tips Saving Time Mobile Device Data Management Social Networking Digital Payment Computer Repair Compliance IT Management Downtime Flexibility Encryption File Sharing Memory Entertainment Tech Support Information Retail Scam Analysis Settings Conferencing Tablet Search Google Drive IT Support Connectivity Twitter Network Congestion Vulnerability Document Management Inbound Marketing Blockchain Virtual Assistant Internet Exlporer Education eWaste Data Storage PDF Statistics Comparison HaaS End of Support Work/Life Balance Data Breach Windows 7 Robot Safety Wi-Fi Touchscreen USB Skype Webinar Telephone System YouTube Programming Government Workers Meetings Running Cable Access Control Augmented Reality Intranet Credit Cards Smart Tech Wearable Technology Video Surveillance DDoS Solid State Drive Data loss Servers Black Market Machine Learning IBM Best Available Fraud Instant Messaging Spam Blocking Piracy CES Leadership IT Plan Environment Cleaning Password Bluetooth Administrator Wireless Physical Security Public Cloud People Human Resources Samsung Biometrics Managed Service Computer Accessories Content Management Paperless Office SaaS Unsupported Software Infrastructure IT service Data storage OneNote Online Currency Hacker Point of Sale Social Recycling Update Software Tips Remote Work Bloatware Legal Hosted Solution IT Security Text Messaging Managing Stress Password Manager Domains Cache Project Management Relocation Computer Care Science Password Management Keyboard Print Server Gaming Console Telephony Unified Communications Devices GDPR Monitor Work Station nternet Crowdfunding Online Shopping Inventory Remote Monitoring and Maintenance Audit Remote Support Google Docs Staff Healthcare Entrepreneur IoT Netflix Botnet Business Mangement Wireless Internet Warranty Data Warehousing Specifications Tablets NIST Law Firm IT Start Menu Theft Thought Leadership E-Commerce Reputation Root Cause Analysis Company Culture Internet exploMicrosoft Supercomputer Regulations Windows Media Player Evernote Virtual Desktop Line of Business Computer Fan Hiring/Firing Voice over Internet Protocol Digital Signature Help Desk Electronic Health Records LinkedIn HBO Cost Management NarrowBand Travel Criminal Wire Upgrades Millennials Analyitcs Cryptocurrency Uninterrupted Power Supply Mobile Cortana Content Filter Camera Customers Net Neutrality Advertising Knowledge Webcam Wireless Charging Customer Service Authentication MSP FENG Windows 8.1 Update Multi-Factor Security Strategy Frequently Asked Questions Insurance Chromecast Patch Management Display Consultant Smart Office Distributed Denial of Service Files Workforce Safe Mode 360 Emails Debate Professional Services Google Apps Storage Screen Mirroring HVAC Notifications Flash Cameras Fiber-Optic Macro Nanotechnology Remote Worker Electronic Medical Records PC Care Lifestyle Business Owner Scheduling Tip of the week Amazon Co-managed IT Practices Laptop Windows 10s 3D Licensing Software as a Service Colocation Telecommuting Virtual Reality Accountants Business Technology Shadow IT eBay Tools WIndows 7 Addiction Virtual Private Network SharePoint Charger Cast Enterprise Content Management Hybrid Cloud HIPAA Sync Printer Server Cables Shortcut Wiring Hiring/Firing Alerts IaaS Computing Infrastructure Windows Server 2008 Worker Commute Amazon Web Services Hosted Computing Proactive Touchpad User Students IT solutions Employer Employee Relationship CrashOverride Smart Technology Books Loyalty Experience Content Battery Two Factor Authentication Regulation Video Games Emergency Thank You Music Worker Audiobook Assessment Scalability Congratulations Printers Rootkit Politics Television How to Transportation Techology Troubleshooting Webinar Automobile Public Computer Benefits

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name *
      • Number of Participants *
      • First Name *
      • Last Name *
      • Phone *
      • Yes, subscribe me to: