703.359.9211

Macro Systems Blog

Please take a moment to read and subscribe to our informative blog.

Two-Factor Authentication Frequently Asked Questions

Two-Factor Authentication Frequently Asked Questions

Data security has to be an absolutely critical consideration of the modern business, so every small step you can take to protect your business is important. One such step is the implementation of two-factor authentication. Warning: your employees may not initially feel very comfortable with some facets of two-factor authentication.


The two-factor authentication platform adds a precious layer of security to your existing solutions by demanding an additional credential beyond just your usual username and password. This can be a PIN that is generated by an application or a physical token like a key fob that provides access.

In short, your employees may not feel entirely relaxed with your company requiring them to keep an application on their phone as they may value the autonomy they have over what they do and don’t keep on their personal device. It is inevitable that they'll have questions that you will need to answer.

To help you with this here are a few questions you may have to field, and how to answer them truthfully and diplomatically if you choose to implement two-factor authentication for your business.

Exactly What is Two-Factor Authentication?
Two-factor authentication is another step to improve data security and stop threats from infiltrating business network’s access points. View your network as a house that your data lives in, with the front door being the access point. The lock that you find in the doorknob is your typical access credentials, username and password. 2FA adds a deadbolt to that door.

In short, 2FA is the amplified security that can prevent many dangers, at the cost of a small bit of convenience.

Why Should You Do This?
Some employees may be resistant to change; unfortunately, information technology is built on change. Dangers to a business’ security are always improving so they have the best chance of creating the most impact. To combat this, a company must acknowledge the threats inherent in powerful technology platforms and do everything they can to control access to their network. 2FA is just another of the many ways to accomplish this..

It's imperative to remember that a chain is only as strong as its weakest link, so the entire company could be made vulnerable if one person doesn’t have the same dedication to organizational network security as the rest of the team. By applying 2FA as a team, the compnay is better protected by the team.

Why Does an Employee Have To Do It On Their Personal Phone?
Because it's in the best interest to the organization and the employees themselves. Does your company have the capital to spare to distribute mobile devices for the singular purpose of enacting 2FA? Typically, the answer to that question is No.

Also, which device is an employee more likely to prefer? Their personal device that they have conditioned themselves into bringing everywhere, or the new, unfamiliar device they were just handed for work?

What Happens If They Lose Or Forget Their Phone?
There are ways to get around a lost or forgotten device. In most cases, a business can adjust an employee’s 2FA settings to allow them access via a new 2FA code, but this will require the employee to alter their credentials. If the phone is lost, the company is still safe, as the Mobile Device Management platform that the 2FA implementation was likely part of will allow network administrators the required authority to handle the situation.

Can They See An Employee's Personal Stuff?
Be prepared for some kind of variation of this question from employees. You should assure them that the privacy of their personal data will not be betrayed, and that the authenticator will only be used to access their company materials.

Information can be a sensitive subject, and its security is of grave importance. Reach out to us at Macro Systems for more help with your company’s data security.

Post Office Protocol and Internet Message Access P...
The Most Important Aspects of Business Communicati...

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 24 January 2018
If you'd like to register, please fill in the username, password and name fields.