Your IT Support Experts - Homepage

We partner with many types of businesses in the area, and strive to eliminate IT issues before they cause expensive downtime, so you can continue to drive your business forward. Our dedicated staff loves seeing our clients succeed. Your success is our success, and as you grow, we grow.


About Us

IT Services

Understanding IT



Contact Us


(703) 359-9211

Free Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you! Sign Up Today

Macro Systems Blog

Two-Factor Authentication Frequently Asked Questions

Two-Factor Authentication Frequently Asked Questions

Data security has to be an absolutely critical consideration of the modern business, so every small step you can take to protect your business is important. One such step is the implementation of two-factor authentication. Warning: your employees may not initially feel very comfortable with some facets of two-factor authentication.

The two-factor authentication platform adds a precious layer of security to your existing solutions by demanding an additional credential beyond just your usual username and password. This can be a PIN that is generated by an application or a physical token like a key fob that provides access.

In short, your employees may not feel entirely relaxed with your company requiring them to keep an application on their phone as they may value the autonomy they have over what they do and don’t keep on their personal device. It is inevitable that they'll have questions that you will need to answer.

To help you with this here are a few questions you may have to field, and how to answer them truthfully and diplomatically if you choose to implement two-factor authentication for your business.

Exactly What is Two-Factor Authentication?
Two-factor authentication is another step to improve data security and stop threats from infiltrating business network’s access points. View your network as a house that your data lives in, with the front door being the access point. The lock that you find in the doorknob is your typical access credentials, username and password. 2FA adds a deadbolt to that door.

In short, 2FA is the amplified security that can prevent many dangers, at the cost of a small bit of convenience.

Why Should You Do This?
Some employees may be resistant to change; unfortunately, information technology is built on change. Dangers to a business’ security are always improving so they have the best chance of creating the most impact. To combat this, a company must acknowledge the threats inherent in powerful technology platforms and do everything they can to control access to their network. 2FA is just another of the many ways to accomplish this..

It's imperative to remember that a chain is only as strong as its weakest link, so the entire company could be made vulnerable if one person doesn’t have the same dedication to organizational network security as the rest of the team. By applying 2FA as a team, the compnay is better protected by the team.

Why Does an Employee Have To Do It On Their Personal Phone?
Because it's in the best interest to the organization and the employees themselves. Does your company have the capital to spare to distribute mobile devices for the singular purpose of enacting 2FA? Typically, the answer to that question is No.

Also, which device is an employee more likely to prefer? Their personal device that they have conditioned themselves into bringing everywhere, or the new, unfamiliar device they were just handed for work?

What Happens If They Lose Or Forget Their Phone?
There are ways to get around a lost or forgotten device. In most cases, a business can adjust an employee’s 2FA settings to allow them access via a new 2FA code, but this will require the employee to alter their credentials. If the phone is lost, the company is still safe, as the Mobile Device Management platform that the 2FA implementation was likely part of will allow network administrators the required authority to handle the situation.

Can They See An Employee's Personal Stuff?
Be prepared for some kind of variation of this question from employees. You should assure them that the privacy of their personal data will not be betrayed, and that the authenticator will only be used to access their company materials.

Information can be a sensitive subject, and its security is of grave importance. Reach out to us at Macro Systems for more help with your company’s data security.

The Most Important Aspects of Business Communicati...
Post Office Protocol and Internet Message Access P...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 21, 2018

Captcha Image

Customer Login

Contact Us

Learn more about what Macro Systems can do for your business.

(703) 359-9211

Macro Systems
3867 Plaza Drive
Fairfax, Virginia 22030