Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

According to Study, Only 28% Utilize Two-Factor Authentication

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.

Using data from Survey Sampling International, the researchers at Duo Labs created a survey to determine the adoption rate of 2FA. This survey was designed to mimic patterns throughout different regions to give an impression of how much 2FA was adopted, and was also targeted to a sample that was created to be proportional to the entire US population. The results of this survey provided some invaluable insights.

However, a few insights were more surprising than others. For example, only 28% used 2FA, and under half of all participants had ever heard of 2FA before taking the survey.

Yet of those who had heard of 2FA, 54% had adopted it voluntarily, and only 20.8% had first used it in their work environments. Considering the number of applications and services that encourage users to utilize 2FA as a security measure, these relatively high numbers make sense. What makes less sense is the fact that the researchers found that less than half of these voluntary adopters used 2FA at every opportunity.

Despite this, some of the survey’s results were a little more positive for the future of 2FA. Analysis of the current state of 2FA has shown a shift in how users authenticated their identities between 2010 and 2017, that shift indicating a reliance on more secure, safer methods. Hard tokens, or physical devices that a user carries to confirm their identity, have seen a decrease in use of about 50% in the time covered by this analysis. These tokens are relatively insecure, as they only need to be lost or stolen to potentially undermine the use of 2FA, so this decrease in their use shows an increase in security awareness and risk management.

Perhaps most importantly, this research provides real insights into the behavior of the user, and what they considered the most important reason to use certain 2FA methods.

Most users indicated that when they compared different approaches to 2FA, they held simplicity and convenience as their most important factors. This helps to explain why 84% of respondents ranked security tokens as the most trustworthy form of 2FA., when the security risks and issues are (as referenced above) well-known by users.

Still, the saddest truth revealed by this survey is that too few users utilize 2FA as they secure their devices, both personal and work related. Hopefully, the repeated security breaches and cyberattacks will help to change that, as the very real risk of data loss and how network security can prevent it is pushed further into the public consciousness.

The question now becomes, are your business’ resources protected by 2FA? If you want professional assistance in implementing it, and other critical security needs, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 18 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Computer Google Workplace Tips Phishing Email IT Services Hosted Solutions Collaboration Users Workplace Strategy Mobile Device Ransomware Microsoft Quick Tips Small Business Cybersecurity Passwords Backup Saving Money Communication Data Backup Smartphone Managed Service Android VoIP Smartphones Productivity Upgrade Business Management Mobile Devices communications Disaster Recovery Data Recovery Social Media Windows Browser Microsoft Office Managed IT Services AI Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Miscellaneous Gadgets Information Covid-19 Cloud Computing Holiday Remote Work Training Server Managed Service Provider Outsourced IT Encryption Spam Employee/Employer Relationship Compliance Office Windows 10 Government IT Support Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Managed Services Chrome Voice over Internet Protocol Gmail Budget Apple Networking How To BDR HIPAA Computing Applications Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing WiFi Operating System Router Computers Virtual Private Network Risk Management Website 2FA Health Help Desk Office Tips Analytics Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Big Data Managed IT Services Windows 7 Social Microsoft 365 Going Green Patch Management Save Money Remote Monitoring Solutions Vulnerability End of Support Vendor Management Customer Service Cybercrime Physical Security Display Windows 11 Printer Monitoring Paperless Office Infrastructure Excel Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Cooperation Free Resource Project Management Images 101 Telephone System Multi-Factor Authentication Mobility Cost Management Robot Customer Relationship Management Settings Printing Wireless Content Filtering Employees Hacking IT Management Integration Presentation VPN YouTube Meetings User Tip Modem Cryptocurrency Mobile Security Processor Wireless Technology Computer Repair Holidays Data Storage Virtual Desktop Smart Technology Supply Chain Data storage LiFi Video Conferencing Managed Services Provider Word Professional Services Saving Time Outlook Virtual Machines Machine Learning Money Managed IT Service Humor Downloads iPhone Safety Maintenance Antivirus Licensing Sports Mouse Vulnerabilities Entertainment Data Privacy Administration Microsoft Excel IT Maintenance Alert Data Analysis Star Wars IT Assessment Application Best Practice Gamification Flexibility Managed IT Staff Value Business Intelligence Buisness File Sharing Dark Data Organization IBM Legal Social Networking IT solutions Legislation Shortcuts How To Ransmoware Notifications Fileless Malware Digital Security Cameras Smart Devices Business Growth Content Remote Working Wearable Technology Memory Vendors Travel Health IT Techology Motherboard Data Breach Google Maps Comparison Google Play Be Proactive Cortana Alt Codes Permissions Workforce Directions Videos Assessment Electronic Health Records Competition Wasting Time Threats Downtime Unified Threat Management Unified Threat Management Trend Micro Hosted Solution Specifications Security Cameras Workplace Strategies Typing Fraud Meta Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Network Congestion Knowledge Google Drive User Error eCommerce User Black Friday SSID Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Point of Sale Media 5G Cyber Monday Medical IT Experience Proxy Server Reviews IP Address Google Docs Cookies Unified Communications Tactics Development Bitcoin Network Management Hotspot Transportation Small Businesses Running Cable Tech Support Google Wallet Mirgation Hypervisor Displays Monitors PowerPoint Shopping Nanotechnology Optimization Recovery Addiction Hard Drives Windows 8 Language Employer/Employee Relationships Outsourcing Laptop Websites Management PCI DSS Domains Drones Chatbots Navigation Distributed Denial of Service Workplace Electronic Medical Records Gig Economy SharePoint Screen Reader Service Level Agreement Internet Service Provider Refrigeration Computing Infrastructure Teamwork Hiring/Firing Halloween Regulations Compliance Public Speaking Lenovo Identity Evernote Paperless Writing Co-managed IT Virtual Reality Bookmark Lithium-ion battery Smart Tech Memes Download Net Neutrality Hacks Server Management Alerts SQL Server Technology Care Entrepreneur Scary Stories Private Cloud Financial Data Superfish History Identity Theft Business Communications Fun Break Fix Scams Twitter Browsers Smartwatch Connectivity IT Deep Learning Upload Procurement Undo Azure Hybrid Work Error Social Network Telework Cyber security Education Multi-Factor Security Tech Human Resources Social Engineering Dark Web Cables Remote Computing CES IoT Communitications Trends Supply Chain Management Mobile Computing Customer Resource management FinTech Regulations Tablet Google Calendar Term Google Apps Search

Blog Archive