logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
21st June 2019 by CyberVision 0 Comments 922 Views
21st June 2019 by CyberVision in Business Security

Multi-Factor Authentication for business security

Passwords are the most popular and most common security measure used in all companies. However, passwords can be the most vulnerable aspect of a business’s security and can have a lot of shortcomings. Passwords do not provide thorough identity checks as anyone who gains access to a specific password can simply enter an account and take whatever they need. The security of an account is based solely on the strength of the password, which is very often not strong enough. Therefore, companies are adopting multi-factor authentication (MFA) to supplement the password as a means of access control.

 

Multi-Factor Authentication is the process of identifying an online user by validating two or more claims presented by the user, each from a different category of factors. The principle of MFA is that there is no perfect authentication factor. Any one factor that is implemented will have its strengths and weaknesses. The concept of multi-factor authentication is that a second or third factor will compensate for the weakness of the other factors.

 

The three basic factors that should be taken into consideration regarding MFA are:

  • The user’s knowledge: A password or PIN number
  • The user’s possession: A mobile device or laptop
  • The user themselves: Their fingerprint or voice

 

Choosing the right authenticators should be a priority. Out-of-band verification methods such as SMS or voice calls are excluded due to the risk of SMS or voice calls being susceptible to interception. It is best to ensure that the MFA method you use is currently recommended and always has the goal of system and data security in mind.

 

Many companies are recognising the threat of data breaches and this indicates why cyber security has become a top priority for many organisations with the rise of cloud communications. It also demonstrates us why MFA is one of the best security measures you can implement to protect your company, users and sensitive data.

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • camsoft cyber security
  • cybervision
  • f-secur cyber security
  • f-secure
  • MFA
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo