Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Start Using Two-Factor Authentication Everywhere, Today

Start Using Two-Factor Authentication Everywhere, Today

It can be easy to slack off when it comes to good password practices. Many users still use the same password across multiple sites and often don’t use secure passwords. Password managers make this a lot easier, but it’s really two-factor authentication (2FA) that can make all the difference. Strong, unique passwords are still important (not all accounts offer two-factor authentication) but let’s talk about why you should always enable two-factor or multifactor on all of your accounts when possible.

Getting into my programs or logged onto different websites has been easy enough by using a password management tool, especially since there are settings that can be enabled to remember a specific device. When logging on from a different device, my phone or email is immediately hit with a notification. It’s a PIN, and without the PIN there is virtually no chance of logging in. This might be annoying if my phone isn’t on me and I’m sent a text notification, but let’s be honest, I don’t go anywhere without my phone, it’s my most valuable tool. 

So, you might have tried 2FA before or you might have been endlessly hitting the “ask me later” option that you are prompted with on new software that implemented the additional authentication measures. Whether you decide to use it or not there is one indisputable statement regarding this feature: two-factor authentication makes your accounts more secure. 

What Is Two-Factor Authentication

Even if you haven’t used 2FA, you’ve probably seen it in action. In fact, many sites, like bank accounts, Google, and Facebook might force a type of 2FA on you. If you’ve ever logged into a website from a different computer and then received an email or notification on your phone that a login from an unknown location just happened - that’s two-factor authentication. Albeit, it’s the reactive version that doesn’t do much to prevent others from gaining access to your information. Let’s not rely on being reactive, and look at true two-factor authentication.

By definition, two-factor or multi-factor authentication is an authentication method in which a computer user is granted access only after successfully presenting two pieces of evidence to an authentication mechanism: knowledge, and possession.

Knowledge: This is your password. You’ve memorized it or stored it securely in a password manager. The idea is that only you know it or have access to that information. In events where you don’t know your password, some sites might also accept your full email address or phone number in order to reset your password.

Possession: This is something that you own and almost always have in your possession. This is typically your smartphone, but other methods might have you carrying around a USB thumb drive or an electronic key that generates a random number.

The instantaneous code that is sent provides one more feature. It acts as an informant. If somebody were to log into one of my accounts with my password, I would find out instantly. Even then, they wouldn’t be able to get the PIN from my text message or authenticator app to finish the login process. This tells me I should change my password immediately, but otherwise my account should be safe.

Don’t Assume You are Safe

Enabling two-factor authentication won’t entirely protect you from threats or breaches. If you have two-factor set up on Facebook, Facebook can still get breached and passwords could be stolen. We see this happen all the time, with high profile attacks on large online entities stealing millions of records in a shot.

Following the other password best practices, like using strong passwords and never using the same password on two accounts is critical.

Recently, we saw the launch of Disney+, and it was reported that several thousand users had their brand-new accounts hijacked within hours of the launch of the service. This wasn’t because Disney was hacked; hackers just attempted to log in to steal accounts with emails and passwords they already had from some other data breach. 

Phishing attacks are plaguing millions of inboxes every single day. These attacks replicate the website in which they are impersonating, with a realistic login screen. Users are tricked to go there, fill in their information, and the credentials are directly sent to the cybercriminals.

As previously mentioned, 2FA isn’t the fix-all to cybersecurity. It does however put one more step between you and an ill-willed cybercriminal. Voyage Technology has many more tips to help your business become more secure. If you would like to talk to one of our experts, give us a call at 800.618.9844. 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 27 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing IT Services Hosted Solutions Collaboration Users Mobile Device Ransomware Workplace Strategy Microsoft Quick Tips Small Business Passwords Backup Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Business Management VoIP Smartphones Upgrade Mobile Devices communications Disaster Recovery Productivity Data Recovery Windows Browser Social Media Microsoft Office Managed IT Services AI Current Events Remote Network Tech Term Internet of Things Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Holiday Gadgets Server Managed Service Provider Information Remote Work Training Miscellaneous Outsourced IT Employee/Employer Relationship Encryption Spam Compliance Office Windows 10 Government Data Management Business Continuity Blockchain IT Support Windows 10 Bandwidth Virtualization Business Technology Wi-Fi Data Security Two-factor Authentication Mobile Office Vendor Apps Mobile Device Management BYOD Chrome Gmail Budget Apple App Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking How To Information Technology Avoiding Downtime BDR Marketing Office 365 HIPAA Applications Access Control WiFi Tip of the week Conferencing Computing Hacker Risk Management Website Office Tips Analytics Router Augmented Reality Virtual Private Network Storage Password Health Bring Your Own Device 2FA Big Data Help Desk Retail Healthcare Operating System Computers Managed IT Services Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Firewall Physical Security Display Printer The Internet of Things Paperless Office Windows 11 Infrastructure Monitoring Social Excel Document Management Going Green Remote Workers Telephone Customer Service Scam Data loss Cybercrime Cryptocurrency Data Privacy Wireless Technology Images 101 Telephone System Multi-Factor Authentication Virtual Desktop Robot Mobility Data storage Cost Management LiFi Word Outlook IT Management VPN Employees Money Meetings Integration Humor User Tip Modem Computer Repair Mobile Security Safety Processor Sports Mouse Holidays Data Storage Administration Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Managed IT Service Customer Relationship Management Maintenance Settings Antivirus Printing Downloads Wireless iPhone Content Filtering Hacking Licensing Presentation YouTube Vulnerabilities Entertainment Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps 5G How To Microsoft Excel IT Maintenance Experience IP Address Data Analysis Google Docs Star Wars IT Assessment Unified Communications Gamification Flexibility Bitcoin Notifications Staff Value Business Intelligence Running Cable Organization Google Wallet Travel Social Networking Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Recovery Google Maps Smart Devices Hard Drives Content Remote Working Windows 8 Wearable Technology Memory Vendors Laptop Domains Health IT Drones Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Assessment Electronic Health Records Refrigeration Wasting Time Threats Halloween Public Speaking Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta Lithium-ion battery User Error Microchip Internet Exlporer Software as a Service Username Hacks Entrepreneur Managing Costs Amazon Scary Stories Point of Sale eCommerce Black Friday SSID Fun Virtual Assistant Outsource IT Database Surveillance Deep Learning Undo Network Management Tech Support IT Technicians Virtual Machine Environment Media Proxy Server Reviews Cookies Education Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Tactics Development Mobile Computing Websites Mirgation Hypervisor Displays Shopping Nanotechnology Optimization PowerPoint Search Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Application Addiction Best Practice Management PCI DSS Chatbots Buisness Navigation IBM Lenovo Gig Economy Legal Screen Reader IT solutions Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Business Growth Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT Cortana Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Alt Codes Twitter Alerts SQL Server Technology Care Competition Financial Data Error History Downtime Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Connectivity IT Hosted Solution Upload Procurement Typing Remote Computing Azure Hybrid Work Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Knowledge CES Google Drive User Tablet IoT Communitications

Blog Archive