XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

Researchers at Duo Labs, using data compiled by Survey Sampling International, designed a survey that would mimic the patterns that could potentially be seen in different regions concerning the adoption rate of 2FA. The results of this survey were striking, as they revealed that only 28% of those surveyed--designed to match up to the entirety of the US population--had adopted 2FA. Over half of the participants had never even heard of 2FA before the survey was administered.

The researchers were also surprised to find that, of those who knew about 2FA, 54% were voluntary adopters, and only 20.8% had been introduced to 2FA in their work environments. However, reflecting upon the number of applications and services that now prompt users to set up some form of 2FA, this is hardly surprising. Yet despite the relatively high number of voluntary adopters, less than half of these respondents used 2FA wherever they could.

However, there were a few results that showed a bit more hope for the utilization of 2FA. First of all, an analysis of the state of 2FA that compares the authentication options in 2010 to those in 2017, shows that more people are relying on more secure methods. For instance, the use of hard tokens (or a physical device used to confirm the bearer’s identity) decreased by half in the span of time the analysis covered. This indicates an increased awareness in the potential security risks that a hard token presents--all it would take is for one of these tokens to be lost or stolen to render 2FA ineffective.

The real takeaway from the results of this research is an insight into user behavior. Namely, convenience and simplicity were important factors when a user formed an opinion of the different approaches to authentication. This helped to contribute to security tokens being ranked as the most trustworthy form of 2FA by 84% of respondents. While there was an awareness that these tokens had their issues (including the risk of losing them, as referenced above) there was still a demonstrated trust in their reliability.

Despite all this, the sad truth persists that too few people are utilizing 2FA to secure their personal and business devices. With any luck, this will change in the near future, as network security has been thrust further into the public consciousness due to the repeated breaches and attacks that have made headlines as businesses rely more heavily on computing resources.

Do you have 2FA in place to protect your business resources? For help implementing it and other crucial security measures, reach out to XFER at 734-927-6666 / 800-Get-XFER.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 27 May 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Backup Best Practices Software Managed Service Provider Workplace Tips Business Computing Small Business Hackers Google Mobile Office Hosted Solutions Productivity Data Hardware Mobile Devices VoIP Quick Tips Gadgets Email Malware IT Support Efficiency Network Social Media Business Management Business Continuity IT Services Server Virtualization Business Smartphones Network Security Miscellaneous Innovation Upgrade Windows Disaster Recovery Communication Managed IT Services Users Microsoft Office Communications Mobile Device Management Computer User Tips Android Passwords Smartphone Marketing Browser Alert Holiday WiFi Vendor Management Data Backup Save Money Cybercrime Remote Monitoring Windows 10 Operating System Mobile Computing Ransomware Bring Your Own Device Apple BYOD Information Technology Computers Avoiding Downtime Data Recovery Big Data Remote Computing Going Green Cloud Computing IT Solutions Current Events The Internet of Things Best Practice History Outsourced IT VPN Telephone Systems Chrome Hacking Automation Phone System Social Engineering Spam Firewall Wireless Technology Employer-Employee Relationship Router Internet of Things IT Consultant Health Trending BDR Application Collaboration App Bandwidth Printer Lithium-ion Battery Proactive IT Office Cybersecurity Budget Excel iPhone Money Managed IT Services Facebook Content Filtering Business Intelligence Business Managament How To Two-factor Authentication Mobility Fax Server Maintenance Artificial Intelligence Recovery Windows 8 Tech Term Value Private Cloud Redundancy Customer Relationship Management Law Enforcement Website Hard Drives Mouse User Error Networking Humor Gmail Outlook Data Protection Antivirus Tutorials Virus Analytics Apps Managed IT Data Security PowerPoint Unified Threat Management Phishing Tablet Search Save Time Data Management Twitter Vulnerability Office Tips Streaming Media Risk Management Inbound Marketing Office 365 Compliance Flexibility Administration Saving Time Retail Mobile Device Digital Payment Google Drive Social Networking Downtime Computer Repair Memory Identity Theft Productivity Network Congestion Conferencing Windows 10 Tech Support Computer Accessories Meetings Robot Sports Scam CES OneNote Online Currency Point of Sale IT Plan Training DDoS Recycling Document Management Social Data Storage Solid State Drive Smart Tech Black Market Statistics Encryption Work/Life Balance Data Breach Unsupported Software Infrastructure Skype Touchscreen Wireless Physical Security Entertainment Programming Cleaning Update Workers Public Cloud Environment Running Cable SaaS Settings Intranet Word Human Resources Comparison Wearable Technology Webinar Video Surveillance Data storage Biometrics Data loss IT service Internet Exlporer Hacker Best Available eWaste Spam Blocking Piracy Bluetooth IBM PDF Safety Wi-Fi People Leadership Credit Cards HaaS End of Support Administrator Samsung IT Management Government USB 3D Multi-Factor Security Strategy Inventory Reputation Scheduling Servers Wireless Charging Charger Cast HIPAA IoT IT Support Entrepreneur Frequently Asked Questions Fraud Hiring/Firing Wireless Internet Internet exploMicrosoft Macro eBay NarrowBand Tablets Workforce Alerts Thought Leadership Co-managed IT Professional Services Google Apps Hiring/Firing Lifestyle Hosted Solution Access Control Customers Windows Media Player Virtual Desktop IT Security Education Flash Fiber-Optic Computer Care Uninterrupted Power Supply Software as a Service Text Messaging Content Management Keyboard Applications Cost Management Print Server Tip of the week Amazon Advertising Chromecast Upgrades Analyitcs nternet Crowdfunding Telecommuting Work Station Content Filter Distributed Denial of Service Audit Files Remote Support Gaming Console Tools Authentication Netflix Customer Service Sync Cables Password Blockchain Insurance Instant Messaging Law Firm IT Windows Server 2008 Amazon Web Services Notifications Root Cause Analysis Consultant Company Culture Analysis Supercomputer Laptop Software Tips Remote Work Storage Computer Fan Colocation Augmented Reality Password Manager LinkedIn Nanotechnology SharePoint Cameras Telephony Unified Communications Shadow IT Google Docs Staff Practices Windows 7 Online Shopping Hybrid Cloud Licensing Net Neutrality Accountants Knowledge Touchpad Virtual Reality File Sharing Help Desk Addiction IaaS FENG Computing Infrastructure WIndows 7 Windows 8.1 Update Botnet Business Mangement Legal Data Warehousing Specifications Patch Management Connectivity Relocation Printer Server Shortcut Display Webcam Start Menu Theft Voice over Internet Protocol Digital Signature 360 Hosted Computing Emails Monitor Worker Commute Debate Regulations Evernote Screen Mirroring User Bloatware HBO Electronic Medical Records Cache Managing Stress Domains Travel Criminal Business Owner YouTube Science PC Care Millennials Devices Windows 10s Mobile Cortana Troubleshooting Webinar Battery Automobile Public Computer Video Games Benefits IT solutions Employer Employee Relationship Wire CrashOverride Scalability Smart Technology Books Loyalty Experience Content How to Two Factor Authentication Techology Emergency Music Worker Audiobook Thank You Assessment Rootkit Politics Television Congratulations Transportation

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *