window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

Researchers at Duo Labs, using data compiled by Survey Sampling International, designed a survey that would mimic the patterns that could potentially be seen in different regions concerning the adoption rate of 2FA. The results of this survey were striking, as they revealed that only 28% of those surveyed--designed to match up to the entirety of the US population--had adopted 2FA. Over half of the participants had never even heard of 2FA before the survey was administered.

The researchers were also surprised to find that, of those who knew about 2FA, 54% were voluntary adopters, and only 20.8% had been introduced to 2FA in their work environments. However, reflecting upon the number of applications and services that now prompt users to set up some form of 2FA, this is hardly surprising. Yet despite the relatively high number of voluntary adopters, less than half of these respondents used 2FA wherever they could.

However, there were a few results that showed a bit more hope for the utilization of 2FA. First of all, an analysis of the state of 2FA that compares the authentication options in 2010 to those in 2017, shows that more people are relying on more secure methods. For instance, the use of hard tokens (or a physical device used to confirm the bearer’s identity) decreased by half in the span of time the analysis covered. This indicates an increased awareness in the potential security risks that a hard token presents--all it would take is for one of these tokens to be lost or stolen to render 2FA ineffective.

The real takeaway from the results of this research is an insight into user behavior. Namely, convenience and simplicity were important factors when a user formed an opinion of the different approaches to authentication. This helped to contribute to security tokens being ranked as the most trustworthy form of 2FA by 84% of respondents. While there was an awareness that these tokens had their issues (including the risk of losing them, as referenced above) there was still a demonstrated trust in their reliability.

Despite all this, the sad truth persists that too few people are utilizing 2FA to secure their personal and business devices. With any luck, this will change in the near future, as network security has been thrust further into the public consciousness due to the repeated breaches and attacks that have made headlines as businesses rely more heavily on computing resources.

Do you have 2FA in place to protect your business resources? For help implementing it and other crucial security measures, reach out to TaylorWorks at 407-478-6600.

Tip of the Week: How to Type Accent Marks and Symb...
11 Ways to Enhance Android Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Data Backup Privacy Hosted Solutions Managed IT Services Hackers Malware Data Recovery VoIP Mobile Devices Google Email Data User Tips Outsourced IT Tech Term Innovation Internet of Things Backup Communications Cloud Computing Internet Productivity Microsoft IT Services Hardware Business Continuity Saving Money Business BDR Cybersecurity Software Efficiency Artificial Intelligence Smartphones Ransomware Communication Small Business Cybercrime Android Smartphone IT Support IT Support Managed IT Services Router Disaster Recovery Chrome Workplace Tips Network Gadgets Browser Business Management Applications Windows 10 Phishing Law Enforcement Managed IT How To Computer Mobile Device Collaboration Business Intelligence Training Avoiding Downtime Spam Save Money Blockchain Access Control Mobile Device Management Computers Virtualization Two-factor Authentication Data Security Server Data Protection Information Money Proactive IT Holiday Mobility BYOD Windows Encryption Office 365 Word Compliance Social Engineering Vulnerability Miscellaneous Settings Servers Upgrade Social Media Firewall App Remote Monitoring Facebook Analysis Wi-Fi IT Management Redundancy Passwords Automation Private Cloud Voice over Internet Protocol Apps Telephone Systems Software as a Service Bandwidth Productivity Alert Connectivity Document Management Managed Service File Sharing Identity Theft Machine Learning Save Time Content Management Update Virtual Assistant Health Credit Cards OneNote Botnet Employer-Employee Relationship Paperless Office Scam Telephone System Smart Tech Fraud Google Drive Data Breach Data loss Solid State Drive Human Resources Mobile Computing Flexibility Google Docs Spam Blocking Password Information Technology VPN Infrastructure Healthcare Business Owner IT Plan Value Operating System Hacker Windows 7 Education Bring Your Own Device Budget Comparison Microsoft Office CES Sports Unsupported Software Keyboard Telephony Data Storage Business Technology Unified Threat Management Networking Big Data Workers Work/Life Balance Website Smart Office Software Tips Trending Proactive SaaS Inventory Skype Evernote Microchip Gmail Patch Management Addiction Employee/Employer Relationship Cleaning Office Tips Risk Management IoT Password Management Project Management Current Events PDF eCommerce Technology Tips Strategy YouTube Excel Millennials GDPR Theft Thought Leadership Meetings webinar Physical Security Lifestyle Remote Monitoring and Maintenance Audit HaaS Wireless Start Menu Wireless Charging Virtual Reality Recycling Cache Data Warehousing WiFi Smartwatch Computer Care NIST Flash Warranty Knowledge Windows 10 Social Emails Tip of the week Workforce E-Commerce Black Market Google Apps Content Filtering Streaming Media Travel Conferencing Hacking Students Line of Business File Versioning Instant Messaging Authentication Mobile Search Engine Worker Commute eWaste Wireless Internet Employee Samsung HIPAA Insurance Cryptocurrency Amazon Printer Hard Drives Network Congestion Vendor Charger Legal Entertainment Windows Server 2008 Telecommuting Camera Downtime Augmented Reality Battery Content Filter Screen Mirroring Bing Staff HBO MSP Multiple Versions Computing Infrastructure Computer Fan Wireless Technology Fiber-Optic USB Nanotechnology Professional Services Criminal Wire Digital Signage Remote Computing Practices Safe Mode Sync Amazon Web Services Mouse Electronic Medical Records IT Consultant Cast Display Marketing Accountants HVAC Remote Work Public Cloud The Internet of Things Password Manager Storage Help Desk Cortana Data Management Digital Signature Electronic Health Records Outlook Remote Worker Restore Data FENG Recovery Cables Tools Multi-Factor Security Google Search Windows 10s Hosted Computing Online Shopping Administrator Leadership Business Mangement Government Security Cameras Netflix Enterprise Content Management Regulations Virtual Private Network Managed Service Provider Shortcuts Users Frequently Asked Questions Specifications Wiring Backup and Disaster Recovery End of Support Unified Communications Devices Root Cause Analysis Customer Service Net Neutrality Experience Employer Employee Relationship Hiring/Firing Mobile Office Quick Tips Content Fun Internet exploMicrosoft Domains ISP Music Utility Computing Computer Accessories Files Politics Two Factor Authentication Vendor Management Office Audiobook Company Culture Advertising CrashOverride Public Speaking Bluetooth Assessment Colocation Presentation Wearable Technology Transportation Regulation History Lithium-ion battery Video Games Relocation Webinar Managing Stress Search Books Tech Support Automobile Television 5G How to Benefits Techology Safety IBM Humor IT solutions Best Practice Printers Worker Public Computer Internet Exlporer Troubleshooting Customer Relationship Management Smart Technology Loyalty User Error Competition Scalability Emergency Twitter IP Address Hybrid Cloud Rootkit Shadow IT Hosted Solution

Mobile? Grab this Article!

QR-Code dieser Seite