Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

Researchers at Duo Labs, using data compiled by Survey Sampling International, designed a survey that would mimic the patterns that could potentially be seen in different regions concerning the adoption rate of 2FA. The results of this survey were striking, as they revealed that only 28% of those surveyed--designed to match up to the entirety of the US population--had adopted 2FA. Over half of the participants had never even heard of 2FA before the survey was administered.

The researchers were also surprised to find that, of those who knew about 2FA, 54% were voluntary adopters, and only 20.8% had been introduced to 2FA in their work environments. However, reflecting upon the number of applications and services that now prompt users to set up some form of 2FA, this is hardly surprising. Yet despite the relatively high number of voluntary adopters, less than half of these respondents used 2FA wherever they could.

However, there were a few results that showed a bit more hope for the utilization of 2FA. First of all, an analysis of the state of 2FA that compares the authentication options in 2010 to those in 2017, shows that more people are relying on more secure methods. For instance, the use of hard tokens (or a physical device used to confirm the bearer’s identity) decreased by half in the span of time the analysis covered. This indicates an increased awareness in the potential security risks that a hard token presents--all it would take is for one of these tokens to be lost or stolen to render 2FA ineffective.

The real takeaway from the results of this research is an insight into user behavior. Namely, convenience and simplicity were important factors when a user formed an opinion of the different approaches to authentication. This helped to contribute to security tokens being ranked as the most trustworthy form of 2FA by 84% of respondents. While there was an awareness that these tokens had their issues (including the risk of losing them, as referenced above) there was still a demonstrated trust in their reliability.

Despite all this, the sad truth persists that too few people are utilizing 2FA to secure their personal and business devices. With any luck, this will change in the near future, as network security has been thrust further into the public consciousness due to the repeated breaches and attacks that have made headlines as businesses rely more heavily on computing resources.

Do you have 2FA in place to protect your business resources? For help implementing it and other crucial security measures, reach out to Professional Computer Associates at 845-876-6561.

Tip of the Week: How to Type Accent Marks and Symb...
11 Ways to Enhance Android Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Hosted Solutions Managed IT Services Malware Disaster Recovery VoIP Google Microsoft Business Software Business Continuity Mobile Devices Productivity Outsourced IT Email Data Internet Smartphones Windows 10 communications Computer Hardware Innovation IT Support Efficiency Ransomware Cybercrime Android Office Data Backup Server Telephone Systems IT Services Browser Alert Computers Business Management Windows Small Business Saving Money Quick Tips Chrome Social Engineering Upgrade User Tips Mobile Device Management Smartphone Managed IT Social Media BYOD Cybersecurity Miscellaneous Cloud Computing Hacking Workplace Tips Passwords Mobility App Work/Life Balance Firewall Office Tips Avoiding Downtime How To Data Recovery Save Money Virtualization Law Enforcement Microsoft Office Network Recovery Holiday Collaboration BDR Private Cloud Flexibility Wi-Fi Two-factor Authentication Bring Your Own Device Communication Managed Service Provider Bandwidth Productivity Proactive IT Money Facebook HaaS Operating System Budget Information Technology Health Password Office 365 User Error Marketing Gadgets Data Management Windows 10 Black Market Router Internet of Things Compliance Google Drive Risk Management Data Breach Phishing SaaS Employer-Employee Relationship Spam Remote Monitoring Automation Safety Artificial Intelligence Gmail Managed IT Services Redundancy Value Business Intelligence Identity Theft Entertainment Save Time Credit Cards Worker Computing Infrastructure Automobile Wearable Technology IT Management Physical Security Apps Mobile Computing Word OneNote Battery VPN Downtime Mobile Device Cleaning Unsupported Software History Content Filtering DDoS Applications Best Practice Charger Data Security Data storage Shadow IT Spam Blocking Government End of Support Solid State Drive Meetings Internet Exlporer Hiring/Firing Wireless Apple Computer Care The Internet of Things Vulnerability Samsung Patch Management Business Owner Public Cloud Keyboard Settings Data Storage Scam Workers Remote Computing Wireless Technology Hybrid Cloud Experience Knowledge Techology Voice over Internet Protocol Loyalty Windows Server 2008 Unified Communications Transportation Customer SharePoint Chromecast Professional Services FENG Colocation Encryption PDF Music Network Congestion Multi-Factor Security Data Warehousing Windows 7 Theft Benefits Emails Tools Notifications USB People Uninterrupted Power Supply Trending Assessment Regulations Cortana Smart Technology Fax Server Fraud Rootkit hacker Troubleshooting IT Consultant Legal Mobile Office Lifestyle Television IT Plan Google Apps IT solutions Amazon Botnet Training Content Hosted Solution Leadership Data Protection Public Computer Amazon Web Services Servers Infrastructure Two Factor Authentication Netflix Education Going Green Travel Vendor Management Root Cause Analysis Audiobook Software Tips Antivirus Robot Tech Support Comparison Online Shopping Flash Password Manager Relocation Politics Laptop Hard Drives Networking Big Data webinar Video Games Specifications Evernote IaaS Sync Electronic Medical Records Distributed Denial of Service Users WiFi Touchpad Software as a Service Unified Threat Management Data loss IBM HBO Books Conferencing Outlook Scalability Millennials YouTube Telephony Windows 10s Virtual Reality Internet exploMicrosoft HIPAA Update Screen Mirroring Supercomputer Frequently Asked Questions Wireless Charging Emergency IT Support Humor Instant Messaging Workforce Skype Employer Employee Relationship Mouse iPhone Worker Commute Advertising eWaste Google Docs Cast Current Events Excel Fiber-Optic Monitor Search Sports Telecommuting NarrowBand Start Menu Computer Accessories Audit Lithium-ion battery Environment Website Tip of the week Cables Running Cable Reputation How to Remote Work Mobile Bluetooth Computer Fan Streaming Media Files Document Management Webinar IT solutions CrashOverride Administration Business Mangement Thank You Recycling Congratulations

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!