Skip to content
"VC3 has made it easier than ever before for our local government to serve our citizens by providing us with modern web tools and a team
of talented and courteous professionals.
City of Valdosta, GA

Find All the Resources You Need

Our resources & insights includes case studies, client testimonials, guides, checklists, blog articles and more!

 

2 min read

Cybersecurity Awareness: Enable Multi-Factor Authentication

Enable Multi-Factor Authentication

It’s the last day of Cybersecurity Awareness Month, and today’s action step is a big one… Multi-Factor Authentication.

“Remind me what that is again…?”

Multi-Factor Authentication (also known as MFA, Two-Factor Authentication, or 2FA) is when a second verification step—your password being the first step—is required to log into an account. The most widely known MFA method is entering a single-use code sent to your verified email address or phone number.

Last week we emphasized the importance of strong passwords and now we’re talking about even more login security. If you have strong passwords, why is MFA important?

Multi-Factor Authentication blocks 99.9% of all attacks.

Imagine the front door of your house has two locks: one is a keyed lock and the other requires your fingerprint. Now imagine there’s a known criminal with an infinite number of keys going door-to-door trying each and every key. It’s a numbers game. At some point they’ll find the right key to the right door.

But now what? There’s still a second lock. And now you’ve been notified that someone has unlocked the first lock. Odds are good you’re not going to rush home from the office to scan your fingerprint and let them in. In fact, you’re probably going to change the key right away.

This is exactly how MFA works. There are three main types of MFA methods.

KNOWLEDGE-BASED
These are things you know. Things like answers to security questions or a secondary PIN. Be careful of using security questions that can be easily guessed or discovered (birth place, spouse’s name, etc).

POSSESSION-BASED
These are things you have. These require you to have something actively in your possession at the time of logging in. This could be access to your texts or email to receive a one-time code, generating a code from a smartphone app, or even a physical USB key or security fob.

INHERENCE-BASED
These are things you are. Things unique to you as an individual like fingerprints, voice recognition, facial recognition, or other biometrics.

Multi-Factor Authentication is continuously gaining traction and more and more services are requiring strong secondary authentication methods.

In fact, industry regulators and government agencies like the FTC are increasingly requiring MFA for certain industries and activities. We’ll be talking more about this in November, so stay tuned.

Like passwords, it’s important to have a system for keeping track of MFA methods. If you need help creating a comprehensive security plan for your business, we’re here to help as always.

Let's talk about how VC3 can help you AIM higher.