XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

Researchers at Duo Labs, using data compiled by Survey Sampling International, designed a survey that would mimic the patterns that could potentially be seen in different regions concerning the adoption rate of 2FA. The results of this survey were striking, as they revealed that only 28% of those surveyed--designed to match up to the entirety of the US population--had adopted 2FA. Over half of the participants had never even heard of 2FA before the survey was administered.

The researchers were also surprised to find that, of those who knew about 2FA, 54% were voluntary adopters, and only 20.8% had been introduced to 2FA in their work environments. However, reflecting upon the number of applications and services that now prompt users to set up some form of 2FA, this is hardly surprising. Yet despite the relatively high number of voluntary adopters, less than half of these respondents used 2FA wherever they could.

However, there were a few results that showed a bit more hope for the utilization of 2FA. First of all, an analysis of the state of 2FA that compares the authentication options in 2010 to those in 2017, shows that more people are relying on more secure methods. For instance, the use of hard tokens (or a physical device used to confirm the bearer’s identity) decreased by half in the span of time the analysis covered. This indicates an increased awareness in the potential security risks that a hard token presents--all it would take is for one of these tokens to be lost or stolen to render 2FA ineffective.

The real takeaway from the results of this research is an insight into user behavior. Namely, convenience and simplicity were important factors when a user formed an opinion of the different approaches to authentication. This helped to contribute to security tokens being ranked as the most trustworthy form of 2FA by 84% of respondents. While there was an awareness that these tokens had their issues (including the risk of losing them, as referenced above) there was still a demonstrated trust in their reliability.

Despite all this, the sad truth persists that too few people are utilizing 2FA to secure their personal and business devices. With any luck, this will change in the near future, as network security has been thrust further into the public consciousness due to the repeated breaches and attacks that have made headlines as businesses rely more heavily on computing resources.

Do you have 2FA in place to protect your business resources? For help implementing it and other crucial security measures, reach out to XFER at 734-927-6666 / 800-Get-XFER.

Tip of the Week: How to Type Accent Marks and Symb...
11 Ways to Enhance Android Security


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Hackers Data Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Malware Gadgets Email Quick Tips Network Security Efficiency Network Innovation IT Support IT Services Social Media Business Management Business Business Continuity Smartphones Server Miscellaneous Upgrade Communication Virtualization Disaster Recovery User Tips Windows Communications Data Backup Computer Microsoft Office Managed IT Services Smartphone Users Browser Mobile Device Management Passwords Data Recovery Android Holiday WiFi Marketing Save Money Outsourced IT Ransomware Alert Tech Term Cybercrime Internet of Things Vendor Management BDR Mobile Computing Chrome Router Operating System Windows 10 Remote Monitoring Cloud Computing Computers Bring Your Own Device Apple BYOD Automation Information Technology Avoiding Downtime Artificial Intelligence Telephone Systems Going Green Spam Firewall Big Data Remote Computing Managed IT Services IT Solutions VPN The Internet of Things Current Events Cybersecurity Best Practice History Collaboration IT Consultant Hacking Social Engineering Printer Facebook Employer-Employee Relationship Trending Health Phone System Wireless Technology Application Productivity Excel Money Windows 10 Bandwidth App Proactive IT Office Budget Mobility Lithium-ion Battery Content Filtering Phishing Mobile Device Office 365 Applications Business Intelligence Networking IT Support Unified Threat Management Business Managament Two-factor Authentication Fax Server iPhone Maintenance How To Mouse Recovery Windows 8 Sports Information Value Private Cloud Redundancy Law Enforcement Data Protection Blockchain Apps Website Encryption User Error Word Antivirus Gmail Humor PowerPoint Data Security Outlook Analytics Tutorials Settings Virus Google Drive Customer Relationship Management Managed IT Access Control Hard Drives Training Tech Support Search Tablet Software as a Service Analysis Twitter Data Management Administration Document Management Save Time Scam Managed Service Streaming Media Risk Management Social Networking Office Tips Digital Payment Computer Repair Connectivity Compliance Vulnerability Flexibility Saving Time Entertainment Identity Theft Administrator Retail Voice over Internet Protocol Downtime File Sharing Memory Human Resources IT Management Servers Conferencing Network Congestion Hacker Social Inbound Marketing Machine Learning Wi-Fi Government YouTube Content Management Spam Blocking Touchscreen Online Currency Meetings Point of Sale Unsupported Software Robot Recycling USB Infrastructure DDoS Paperless Office Education Update Statistics Solid State Drive Video Surveillance Black Market Skype Comparison OneNote Programming Telephony Google Docs Cleaning Password Virtual Assistant Windows 7 Wireless Physical Security IBM Running Cable Public Cloud Data Storage Piracy Augmented Reality Intranet Botnet SaaS Instant Messaging Wearable Technology Keyboard Leadership Environment Telephone System Work/Life Balance Data Breach Webinar Credit Cards Computer Accessories Data storage Best Available Biometrics Display Workers Bluetooth Internet Exlporer Smart Tech IT service Help Desk eWaste CES People PDF Fraud Samsung HaaS End of Support IT Plan Data loss Safety Smart Office Bloatware Lifestyle FENG Gaming Console Insurance Managing Stress Flash Domains Fiber-Optic Knowledge Work Station Science Patch Management Safe Mode Tip of the week Amazon Reputation Storage Internet exploMicrosoft HVAC Security Cameras Telecommuting Screen Mirroring Nanotechnology Remote Worker Tools 360 Emails Search Engine Entrepreneur Macro Electronic Medical Records IT Security NarrowBand Practices Sync Cables Virtual Private Network Tablets Co-managed IT Windows 10s Print Server Uninterrupted Power Supply Accountants Business Technology Windows Server 2008 Business Owner Amazon Web Services Customers Addiction nternet Crowdfunding Advertising Enterprise Content Management Windows Media Player Software Tips Virtual Desktop Remote Work Charger Cast Remote Support Wiring Hiring/Firing Password Manager Distributed Denial of Service Files Students Bing Cost Management Hiring/Firing Chromecast Hosted Computing Proactive HIPAA Unified Communications Cache Project Management Upgrades Analyitcs Staff Webcam Law Firm IT Online Shopping Company Culture Business Mangement Notifications Password Management Customer Service Computer Care Devices GDPR Hosted Solution LinkedIn Colocation Healthcare Shortcuts Data Warehousing Specifications Laptop Inventory Remote Monitoring and Maintenance Consultant Start Menu Theft Wireless Internet Warranty Digital Signature Audit Shadow IT IoT Regulations Evernote PC Care Net Neutrality SharePoint Travel Criminal Netflix Scheduling Hybrid Cloud NIST Cameras HBO 3D Windows 8.1 Update Thought Leadership E-Commerce IaaS Computing Infrastructure Electronic Health Records eCommerce Millennials Root Cause Analysis eBay Touchpad Line of Business Licensing Mobile Cortana Relocation Wire Microchip Virtual Reality Multi-Factor Security Strategy Computer Fan Debate Legal WIndows 7 Wireless Charging Supercomputer Alerts Cryptocurrency Printer Server Frequently Asked Questions Shortcut Monitor Content Filter Camera Vendor Worker Commute Workforce Text Messaging Authentication MSP User Professional Services Google Apps Utility Computing Audiobook Congratulations Assessment Printers Rootkit Battery Video Games Politics Transportation Smartwatch Television Employee/Employer Relationship Troubleshooting Webinar Scalability Benefits Automobile Public Computer IT solutions Employer Employee Relationship CrashOverride How to Smart Technology Techology Books Loyalty Experience Two Factor Authentication Regulation Content Emergency Thank You Worker Music

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *