window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORTLunch & Learn

TaylorWorks Blog

Tip of the Week: Your Phone Can Work as Your Security Key

Tip of the Week: Your Phone Can Work as Your Security Key

If you’re like most people nowadays, your mobile phone is currently well within your reach (and that’s assuming you aren’t reading this blog on it). The fact that most people keep their phone on them at all times has greatly contributed to these devices becoming a part of any given work-related process. One major way is the implementation of two-factor authentication, which we’ll discuss as a part of this week’s tip.

As we begin, it is important that we acknowledge that the Android operating system has been granted FIDO2 certification. In other words, the FIDO (Fast IDentity Online) Alliance has given the Android OS their seal of approval in regard to the authentication standards that the Alliance has set.

What Does This Mean?

In very simple terms, any Android device running 7.0 or higher with the latest Google Chrome update installed can be used as part of a two-factor authentication strategy - more specifically, as a security key. This includes the support that FIDO2 offers for onboard fingerprint scanners as a means of identity authentication. Currently, this authentication standard is only supported by Android, with no indication of Apple devices incorporating it.

In no uncertain terms, this all means that passwords may soon be phased out.

Abandoning Passwords

Passwords have been the standardized form of authenticating one’s identity for quite some time, despite the potential issues that are present with them. How often have we seen just how many ways a determined cybercriminal has to obtain a password? Between insecure databases filled with credentials and unfortunately successful phishing schemes, millions of accounts have been exposed - and that isn’t even taking all the times an insecure password was guessed into account.

The biggest weakness that any password has is the fact that it can be shared at all, that someone other than the owner can use it. Over any other reason, this is why FIDO2 is likely to become as popular as it is expected to be. When was the last time you successfully shared a thumbprint with someone, after all? Furthermore, FIDO2 keeps all of the information that is pulled from its biometrics onboard the device, keeping it safe from being stolen on the Internet.

As an added bonus, FIDO2 won’t allow the user to input their fingerprint’s biometric data into websites that don’t have sufficient security measures in place.

How to Use Your Android Device as a FIDO2 Security Key

In order to leverage your Android device as a security key, you need to make sure that it meets a few benchmarks. First and foremost, you’ll need to be running at least Android 7.0, with the latest version of Chrome installed. You will also need to have Bluetooth activated, and a Google account with two-step verification enabled.

This is somewhat simple to do. Logging into your Google account, access the Security section. Here, you’ll find the option to activate 2-Step Verification. After a short process, your smartphone will work as a security key.

Authenticating Google Sign-Ins with Your Phone

As long as you have enabled both Bluetooth and Location on your mobile device, any Google service you try to access will prompt you to confirm the sign-in attempt via your phone. This process is exceptionally simple - all you have to do is press Yes on your phone and wait. Once you’ve done so, you can confidently access your Google account, securely. As more developers adopt FIDO2, this enhanced security will only appear more often.

What do you think of this new authentication method? Share your impressions in the comments! While you’re there, let us know if there are any other tips you’d like us to cover!

Virtual Reality has a Limitless Future
How to Mitigate Unhappy Online Opinions


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, May 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Privacy Data Backup Hosted Solutions Managed IT Services Hackers Malware Email Data Recovery Productivity Internet Innovation User Tips Mobile Devices VoIP Data Google Communications Microsoft Internet of Things Outsourced IT Efficiency IT Services Tech Term Cloud Computing Backup Hardware Cybersecurity Software Business Communication Business Continuity Android Workplace Tips Artificial Intelligence Saving Money BDR Smartphones IT Support Business Management Small Business Gadgets Disaster Recovery Ransomware Managed IT Services Smartphone Windows 10 Router Mobile Device IT Support Network Cybercrime Phishing Browser Chrome Collaboration Applications Server Encryption Managed IT Training BYOD How To Spam Computer Windows Law Enforcement Business Intelligence Save Money Computers Office 365 Users Blockchain Access Control Data Security Information Social Media Avoiding Downtime Mobile Device Management Data Protection Holiday Mobility Proactive IT Virtualization Two-factor Authentication Passwords Word Money Settings Alert Machine Learning Firewall Servers Miscellaneous Paperless Office Social Engineering Upgrade Redundancy IT Management Analysis Automation Remote Monitoring Telephone Systems App Managed Service Voice over Internet Protocol Operating System Facebook Education Business Technology Wi-Fi Software as a Service Bandwidth Document Management Private Cloud Connectivity Manufacturing Identity Theft Apps Compliance File Sharing Productivity Vulnerability Telephone System Microsoft Office Update Budget Credit Cards Meetings Botnet Content Management OneNote Scam Big Data Virtual Reality Fraud Website Data loss Data Breach Mobile Computing Health Smart Tech Google Docs Spam Blocking Display Wireless Employer-Employee Relationship Human Resources Help Desk Business Owner Google Drive Remote Computing Cryptocurrency Infrastructure IT Plan Value VPN Bring Your Own Device Flexibility Solid State Drive Staff Healthcare Virtual Private Network Windows 7 Information Technology Keyboard Comparison Password Telephony Augmented Reality Unsupported Software Cables Virtual Assistant Work/Life Balance Data Storage Government Unified Threat Management Networking Save Time Workers CES Sports Hacker Current Events Unified Communications Devices Smartwatch Cleaning Cortana Warranty Biometric Security Social Smart Office E-Commerce Database Excel Millennials Inventory Start Menu Wireless Charging webinar Managed Service Provider Gmail Addiction Line of Business File Versioning Physical Security Lifestyle Audit IoT Password Management Search Engine Knowledge End of Support Theft Thought Leadership Employee Data Warehousing WiFi Computer Care Strategy YouTube Printer Black Market OLED Content Filtering Flash Vendor Hacking Travel Vendor Management Emails Camera Instant Messaging Tip of the week Workforce Bing Worker Commute Mobile Conferencing PDF Recycling Cache MSP Multiple Versions HIPAA Office Tips NIST Amazon Network Congestion Google Apps Streaming Media Legal Digital Signage Entertainment Samsung Technology Tips Quick Tips Mouse Battery Cabling Authentication Screen Mirroring Charger Students Distribution USB Windows Server 2008 Telecommuting Downtime HaaS Professional Services eWaste Wireless Internet Remote Worker Restore Data Windows 10 HBO Computer Fan Insurance Sync Amazon Web Services Electronic Medical Records IT Consultant Content Filter Google Search Administrator Default App Fiber-Optic Nanotechnology Security Cameras Data Management Cast Recovery Logistics Remote Work Shortcuts Tools Hard Drives Criminal Wire Wiring Backup and Disaster Recovery Outlook FENG Practices Safe Mode Online Shopping Leadership Password Manager Storage Proactive Net Neutrality Multi-Factor Security Windows 10s Accountants HVAC Microchip Computing Infrastructure Employee/Employer Relationship Wireless Technology 5G Netflix Digital Signature Electronic Health Records Project Management Regulations eCommerce Root Cause Analysis GDPR Cryptomining Frequently Asked Questions Specifications Hosted Computing Skype Evernote Public Cloud Business Mangement Remote Monitoring and Maintenance ISP The Internet of Things Risk Management Software Tips Trending SaaS Enterprise Content Management Marketing Patch Management Internet Exlporer Content Competition Customer Relationship Management Music User Error IP Address Computer Accessories Hybrid Cloud Politics Two Factor Authentication Regulation Audiobook Hiring/Firing Analytics Customer Service Wearable Technology CrashOverride Mobile Office Transportation Bluetooth Video Games Assessment Fun Internet exploMicrosoft Domains Company Culture Books Automobile Webinar Printers How to Benefits Television Files Advertising Best Practice Public Speaking Office Managing Stress Presentation IT solutions Troubleshooting Colocation Lithium-ion battery Smart Technology Worker Scalability Public Computer History Search Loyalty Relocation Emergency Shadow IT Tech Support Hosted Solution Safety Rootkit IBM Experience Techology Employer Employee Relationship Twitter Humor Utility Computing

Mobile? Grab this Article!

QR-Code dieser Seite