Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

Researchers at Duo Labs, using data compiled by Survey Sampling International, designed a survey that would mimic the patterns that could potentially be seen in different regions concerning the adoption rate of 2FA. The results of this survey were striking, as they revealed that only 28% of those surveyed--designed to match up to the entirety of the US population--had adopted 2FA. Over half of the participants had never even heard of 2FA before the survey was administered.

The researchers were also surprised to find that, of those who knew about 2FA, 54% were voluntary adopters, and only 20.8% had been introduced to 2FA in their work environments. However, reflecting upon the number of applications and services that now prompt users to set up some form of 2FA, this is hardly surprising. Yet despite the relatively high number of voluntary adopters, less than half of these respondents used 2FA wherever they could.

However, there were a few results that showed a bit more hope for the utilization of 2FA. First of all, an analysis of the state of 2FA that compares the authentication options in 2010 to those in 2017, shows that more people are relying on more secure methods. For instance, the use of hard tokens (or a physical device used to confirm the bearer’s identity) decreased by half in the span of time the analysis covered. This indicates an increased awareness in the potential security risks that a hard token presents--all it would take is for one of these tokens to be lost or stolen to render 2FA ineffective.

The real takeaway from the results of this research is an insight into user behavior. Namely, convenience and simplicity were important factors when a user formed an opinion of the different approaches to authentication. This helped to contribute to security tokens being ranked as the most trustworthy form of 2FA by 84% of respondents. While there was an awareness that these tokens had their issues (including the risk of losing them, as referenced above) there was still a demonstrated trust in their reliability.

Despite all this, the sad truth persists that too few people are utilizing 2FA to secure their personal and business devices. With any luck, this will change in the near future, as network security has been thrust further into the public consciousness due to the repeated breaches and attacks that have made headlines as businesses rely more heavily on computing resources.

Do you have 2FA in place to protect your business resources? For help implementing it and other crucial security measures, reach out to Professional Computer Associates at 845-876-6561.

Tip of the Week: How to Type Accent Marks and Symb...
11 Ways to Enhance Android Security


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 21 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions Managed IT Services Google VoIP Mobile Devices Disaster Recovery Microsoft Software Productivity Email Business Continuity Business Internet Outsourced IT Data Innovation Data Backup Cybercrime Efficiency communications Smartphones Ransomware Windows 10 IT Support Computer Cloud Computing IT Services Browser Data Recovery Hardware Android Internet of Things Office BDR Alert Computers Server Windows Business Management Saving Money Tech Term Telephone Systems User Tips Mobile Device Management Cybersecurity Small Business Smartphone Virtualization Network Upgrade Quick Tips BYOD Microsoft Office Social Engineering Managed IT Collaboration Save Money Chrome Workplace Tips Law Enforcement Bandwidth Private Cloud Artificial Intelligence Facebook Hacking Password Communication Office Tips Managed Service Provider Holiday Mobility How To Office 365 Router Work/Life Balance Money Social Media Avoiding Downtime Miscellaneous Passwords App Productivity Firewall Recovery Business Intelligence Budget Two-factor Authentication Data Management Operating System Bring Your Own Device Gmail Data Protection Flexibility Wi-Fi Phishing Data Security Proactive IT HaaS Automation Applications Remote Monitoring Health VPN Information Technology Redundancy Identity Theft Employer-Employee Relationship Windows 10 Gadgets Value Word Black Market Blockchain Document Management Google Drive Cleaning Apps Spam User Error Marketing SaaS Compliance Entertainment Mobile Device Data Breach Vulnerability Connectivity Managed IT Services Big Data Safety Risk Management Remote Computing Hiring/Firing HIPAA Wireless Technology Computer Care DDoS CES Smart Tech Windows 7 Samsung Credit Cards Patch Management PDF Content Management Business Owner IT Management Keyboard Computing Infrastructure Meetings Scam OneNote Wireless Apple Mobile Computing IT Plan Physical Security eWaste Save Time Unsupported Software Servers Downtime Settings Worker Comparison Automobile USB History Streaming Media Access Control Legal Spam Blocking Infrastructure Best Practice Shadow IT Battery Data loss Data storage Encryption Government Training End of Support Analysis Internet Exlporer Update Education Wearable Technology IT Support YouTube Content Filtering The Internet of Things Charger Networking Paperless Office Sports Electronic Medical Records Website Data Storage Solid State Drive Workers Public Cloud IoT Knowledge Voice over Internet Protocol Virtual Reality Safe Mode Reputation Windows Server 2008 Files Thought Leadership Antivirus Fiber-Optic Supercomputer Emergency Professional Services Hybrid Cloud Instant Messaging Healthcare FENG Network Congestion Employer Employee Relationship Multi-Factor Security Worker Commute File Sharing Data Warehousing Customer Colocation Content Filter Emails Chromecast Cables Current Events Tools Search Electronic Health Records Distributed Denial of Service WiFi Insurance Computer Accessories Trending Business Technology Regulations Storage Unified Communications Fraud How to Machine Learning Uninterrupted Power Supply Practices IT Consultant Bluetooth Lifestyle Virtual Assistant Experience hacker Techology Theft Loyalty Amazon Transportation Botnet Mouse Human Resources Hosted Computing Leadership Telephone System Amazon Web Services Music Addiction Netflix Cortana Benefits Travel Root Cause Analysis Staff Software Tips Inventory Environment Lithium-ion battery Online Shopping Flash Cache Running Cable Going Green Google Apps Assessment Tech Support Smart Technology HVAC Robot Digital Signature Relocation webinar Rootkit Specifications Television Evernote Troubleshooting Sync Wireless Internet Laptop SharePoint Software as a Service Enterprise Content Management Strategy Content HBO Authentication Conferencing IaaS Millennials Public Computer Hosted Solution Telephony Wire Windows 10s Touchpad Password Manager Two Factor Authentication Password Management Screen Mirroring Outlook Audiobook Notifications Frequently Asked Questions Nanotechnology People Vendor Management Workforce Skype Internet exploMicrosoft Smart Office Business Mangement Fax Server Accountants Google Docs NIST Cast Humor Politics Excel iPhone Hard Drives Mobile Office Telecommuting Start Menu Advertising Video Games Audit Recycling IT solutions Users Cryptocurrency Monitor Tip of the week Devices NarrowBand Wireless Charging Unified Threat Management Remote Work IBM Books Mobile Scalability Students Computer Fan Criminal Webinar Thank You Twitter IT solutions Congratulations Company Culture CrashOverride Administration Managing Stress

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!