Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

According to Study, Only 28% Utilize Two-Factor Authentication

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.

Using data from Survey Sampling International, the researchers at Duo Labs created a survey to determine the adoption rate of 2FA. This survey was designed to mimic patterns throughout different regions to give an impression of how much 2FA was adopted, and was also targeted to a sample that was created to be proportional to the entire US population. The results of this survey provided some invaluable insights.

However, a few insights were more surprising than others. For example, only 28% used 2FA, and under half of all participants had ever heard of 2FA before taking the survey.

Yet of those who had heard of 2FA, 54% had adopted it voluntarily, and only 20.8% had first used it in their work environments. Considering the number of applications and services that encourage users to utilize 2FA as a security measure, these relatively high numbers make sense. What makes less sense is the fact that the researchers found that less than half of these voluntary adopters used 2FA at every opportunity.

Despite this, some of the survey’s results were a little more positive for the future of 2FA. Analysis of the current state of 2FA has shown a shift in how users authenticated their identities between 2010 and 2017, that shift indicating a reliance on more secure, safer methods. Hard tokens, or physical devices that a user carries to confirm their identity, have seen a decrease in use of about 50% in the time covered by this analysis. These tokens are relatively insecure, as they only need to be lost or stolen to potentially undermine the use of 2FA, so this decrease in their use shows an increase in security awareness and risk management.

Perhaps most importantly, this research provides real insights into the behavior of the user, and what they considered the most important reason to use certain 2FA methods.

Most users indicated that when they compared different approaches to 2FA, they held simplicity and convenience as their most important factors. This helps to explain why 84% of respondents ranked security tokens as the most trustworthy form of 2FA., when the security risks and issues are (as referenced above) well-known by users.

Still, the saddest truth revealed by this survey is that too few users utilize 2FA as they secure their devices, both personal and work related. Hopefully, the repeated security breaches and cyberattacks will help to change that, as the very real risk of data loss and how network security can prevent it is pushed further into the public consciousness.

The question now becomes, are your business’ resources protected by 2FA? If you want professional assistance in implementing it, and other critical security needs, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 03 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Passwords Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Facebook Miscellaneous Holiday Information Artificial Intelligence Covid-19 Gadgets Cloud Computing Training Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Blockchain Apps Data Security Two-factor Authentication Mobile Office Vendor Mobile Device Management Budget Gmail Tip of the week Apple WiFi App Networking Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Chrome Applications Access Control Conferencing How To BDR Computing Information Technology Hacker Avoiding Downtime Office 365 Marketing HIPAA Health Storage Password Bring Your Own Device Help Desk Retail Big Data 2FA Managed IT Services Operating System Risk Management Computers Office Tips Website Analytics Healthcare Virtual Private Network Augmented Reality Router Paperless Office Infrastructure Firewall Free Resource Project Management Windows 7 Document Management Monitoring Microsoft 365 The Internet of Things Solutions Going Green Social Windows 11 Scam Data loss Telephone Cybercrime Excel Cooperation Patch Management Customer Service Save Money Remote Monitoring End of Support Vulnerability Vendor Management Physical Security Remote Workers Display Printer Vulnerabilities User Tip Modem Mobile Security Processor Sports Mouse Images 101 Machine Learning Mobility Safety Multi-Factor Authentication Smart Technology Administration Maintenance Saving Time Antivirus Employees Managed IT Service Integration Settings Printing Wireless Supply Chain Downloads Content Filtering Licensing Customer Relationship Management YouTube Holidays Entertainment Robot Data Storage Cryptocurrency Hacking Video Conferencing Presentation Managed Services Provider Professional Services Virtual Desktop Telephone System Virtual Machines Cost Management IT Management Data storage Wireless Technology LiFi VPN Meetings Data Privacy Outlook iPhone Money Computer Repair Word Humor Tech Hacks Monitors Scary Stories Username Telework Shortcuts Cyber security Communitications Black Friday Refrigeration Fun CES Ransmoware Database Vendors Supply Chain Management Websites Public Speaking Deep Learning Term Lithium-ion battery FinTech IT Technicians Be Proactive SharePoint IT Assessment Cyber Monday Electronic Medical Records Education Proxy Server Entrepreneur Cookies Workforce Tactics Threats Flexibility Hotspot Value Mobile Computing Writing Organization Mirgation Workplace Strategies Lenovo Smart Devices Virtual Reality Undo Search Digital Security Cameras Nanotechnology Meta Addiction Amazon Remote Working Language Server Management Memory Private Cloud Best Practice Identity Theft Google Play Buisness Management Chatbots Superfish Data Breach Electronic Health Records Distributed Denial of Service Legal Twitter IT solutions Videos Screen Reader Outsource IT Service Level Agreement Environment Computing Infrastructure Media Wasting Time Error Business Growth Security Cameras Social Engineering Application Identity Trend Micro Software as a Service Remote Computing Bookmark Cortana Smart Tech Small Businesses Download Displays Alerts Managing Costs IBM Alt Codes Tablet SSID Downtime eCommerce Outsourcing Surveillance Break Fix Virtual Assistant Alert Hosted Solution Browsers Connectivity Dark Data Upload Managed IT Virtual Machine File Sharing Typing Medical IT How To Social Network Reviews Workplace Multi-Factor Security IoT Hiring/Firing Development Dark Web Transportation Google Drive Notifications Competition Knowledge Trends Paperless Hypervisor Travel Google Calendar Google Maps PowerPoint Customer Resource management 5G Shopping Regulations Co-managed IT Techology Optimization Star Wars Technology Care Microsoft Excel Employer/Employee Relationships Google Docs Unified Communications Data Analysis Experience Bitcoin User Running Cable Gamification PCI DSS Staff Business Communications Unified Threat Management Navigation Legislation Google Wallet Gig Economy Social Networking Scams Unified Threat Management Hybrid Work Internet Service Provider Teamwork Fileless Malware IP Address Windows 8 Network Congestion Laptop Content Regulations Compliance Wearable Technology Human Resources Evernote Memes Comparison Drones Health IT Motherboard Cables User Error Assessment Net Neutrality Permissions SQL Server Directions Recovery Halloween Financial Data Google Apps History Point of Sale IT Specifications Hard Drives Smartwatch IT Maintenance Internet Exlporer Business Intelligence Procurement Fraud Network Management Azure Tech Support Domains Microchip

Blog Archive