XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

Researchers at Duo Labs, using data compiled by Survey Sampling International, designed a survey that would mimic the patterns that could potentially be seen in different regions concerning the adoption rate of 2FA. The results of this survey were striking, as they revealed that only 28% of those surveyed--designed to match up to the entirety of the US population--had adopted 2FA. Over half of the participants had never even heard of 2FA before the survey was administered.

The researchers were also surprised to find that, of those who knew about 2FA, 54% were voluntary adopters, and only 20.8% had been introduced to 2FA in their work environments. However, reflecting upon the number of applications and services that now prompt users to set up some form of 2FA, this is hardly surprising. Yet despite the relatively high number of voluntary adopters, less than half of these respondents used 2FA wherever they could.

However, there were a few results that showed a bit more hope for the utilization of 2FA. First of all, an analysis of the state of 2FA that compares the authentication options in 2010 to those in 2017, shows that more people are relying on more secure methods. For instance, the use of hard tokens (or a physical device used to confirm the bearer’s identity) decreased by half in the span of time the analysis covered. This indicates an increased awareness in the potential security risks that a hard token presents--all it would take is for one of these tokens to be lost or stolen to render 2FA ineffective.

The real takeaway from the results of this research is an insight into user behavior. Namely, convenience and simplicity were important factors when a user formed an opinion of the different approaches to authentication. This helped to contribute to security tokens being ranked as the most trustworthy form of 2FA by 84% of respondents. While there was an awareness that these tokens had their issues (including the risk of losing them, as referenced above) there was still a demonstrated trust in their reliability.

Despite all this, the sad truth persists that too few people are utilizing 2FA to secure their personal and business devices. With any luck, this will change in the near future, as network security has been thrust further into the public consciousness due to the repeated breaches and attacks that have made headlines as businesses rely more heavily on computing resources.

Do you have 2FA in place to protect your business resources? For help implementing it and other crucial security measures, reach out to XFER at 734-927-6666 / 800-Get-XFER.

Tip of the Week: How to Type Accent Marks and Symb...
11 Ways to Enhance Android Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Google Hosted Solutions Hackers Data Productivity Mobile Office Hardware Mobile Devices VoIP Gadgets Quick Tips Email Malware Efficiency IT Support Network Social Media Business Management Innovation Smartphones IT Services Network Security Miscellaneous Business Continuity Business Server Virtualization Upgrade Windows Disaster Recovery Communication Microsoft Office Managed IT Services Computer Users Communications Mobile Device Management User Tips Passwords Data Backup Android Browser Marketing Smartphone WiFi Holiday Save Money Alert Data Recovery Vendor Management Windows 10 Operating System Ransomware Remote Monitoring Mobile Computing Cybercrime Tech Term Outsourced IT Information Technology Internet of Things Avoiding Downtime Computers BDR Bring Your Own Device Apple Cloud Computing BYOD Big Data Going Green Remote Computing IT Solutions The Internet of Things VPN Chrome Automation Telephone Systems Current Events Router History Best Practice Trending Application Facebook Artificial Intelligence Firewall Collaboration Hacking Phone System Wireless Technology Social Engineering Health Spam Cybersecurity IT Consultant Employer-Employee Relationship Office Excel App Budget Printer Managed IT Services Bandwidth Lithium-ion Battery Money Proactive IT Two-factor Authentication Mobility Recovery iPhone Business Managament Fax Server Content Filtering Networking Maintenance How To Windows 8 Business Intelligence Apps Office 365 Applications Analytics PowerPoint Unified Threat Management Phishing User Error Humor Data Protection Customer Relationship Management Managed IT Outlook Value Tutorials Hard Drives Virus Mouse Website Data Security Private Cloud Gmail Redundancy Law Enforcement Antivirus Digital Payment Saving Time Tech Support IT Management Social Networking Productivity Retail Computer Repair Downtime Windows 10 File Sharing Memory Network Congestion Analysis Conferencing Google Drive IT Support Vulnerability Blockchain Sports Search Connectivity Save Time Word Tablet Inbound Marketing Twitter Office Tips Document Management Streaming Media Risk Management Identity Theft Compliance Flexibility Administration Data Management Mobile Device Entertainment Access Control Solid State Drive Data loss Instant Messaging Settings Servers Video Surveillance Encryption Augmented Reality Intranet Environment Black Market Running Cable Smart Tech Wearable Technology Spam Blocking Human Resources Scam CES Cleaning Password Machine Learning Biometrics IT Plan Wireless Physical Security IT service Piracy Public Cloud IBM Information Administrator SaaS Hacker Leadership Content Management Best Available Bluetooth Infrastructure Unsupported Software Computer Accessories Paperless Office OneNote Data storage People Update Samsung USB Training Internet Exlporer Data Storage Robot eWaste PDF Online Currency Social Comparison Windows 7 HaaS End of Support Recycling Webinar Safety Wi-Fi Point of Sale Work/Life Balance Data Breach Government Education YouTube Statistics Workers Touchscreen Meetings DDoS Programming Skype Credit Cards Law Firm IT Line of Business Consultant Mobile Cortana Uninterrupted Power Supply Company Culture Electronic Health Records Millennials Customers Wireless Charging Advertising Wire FENG Multi-Factor Security Strategy Knowledge Frequently Asked Questions Fraud Distributed Denial of Service Files Content Filter Patch Management Chromecast LinkedIn Cryptocurrency Cameras Authentication MSP 360 Emails Licensing Professional Services Google Apps Net Neutrality Screen Mirroring Macro Webcam Workforce WIndows 7 Flash Fiber-Optic Notifications Windows 8.1 Update Smart Office Electronic Medical Records Virtual Reality Co-managed IT Lifestyle Insurance Tip of the week Amazon Colocation Display Storage Windows 10s Software as a Service Laptop Safe Mode Business Owner Printer Server Shortcut Debate Nanotechnology User PC Care Tools Shadow IT HVAC Charger Cast Worker Commute Telecommuting SharePoint HIPAA Managing Stress Domains 3D Sync Cables Hybrid Cloud Hiring/Firing Bloatware Scheduling Practices Managed Service Windows Server 2008 eBay Amazon Web Services IaaS Computing Infrastructure Addiction Science Touchpad Accountants Business Technology Relocation Hosted Solution Alerts Password Manager Legal Enterprise Content Management Computer Care Software Tips Remote Work Keyboard Telephony Unified Communications Students Entrepreneur Monitor Hosted Computing Proactive Text Messaging Online Shopping Cache Audit Tablets Google Docs Staff Virtual Assistant IT Security Devices Netflix Hiring/Firing Botnet Work Station Business Mangement Password Management Windows Media Player Virtual Desktop Gaming Console Inventory Remote Monitoring and Maintenance Help Desk Start Menu Theft Healthcare Root Cause Analysis Cost Management Data Warehousing Specifications Reputation Print Server Regulations Evernote Internet exploMicrosoft Remote Support Wireless Internet Computer Fan Upgrades Analyitcs Voice over Internet Protocol Digital Signature nternet Crowdfunding IoT Telephone System Supercomputer Thought Leadership Travel Criminal NarrowBand NIST Customer Service HBO Music Worker Congratulations Regulation Audiobook Scalability Assessment Rootkit Politics Transportation How to Television Remote Worker Troubleshooting Webinar Techology Benefits Automobile Public Computer Wiring IT solutions Employer Employee Relationship CrashOverride Smart Technology Books Loyalty Experience Thank You Two Factor Authentication Battery Content Emergency Video Games

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *