loader image
1 (833) 944 6009

It’s a simple form of digital security you’ve been using for as long as you’ve had your bank account. Using your access card and a pin code, that is a perfect example of Multi-factor authentication. You are using both a possession factor (your physical card) and a knowledge factor (your pin code).

Multi-factor authentication (MFA) is an added security feature that is simple to implement, assuring its increased popularity. MFA consists of two or more independent credentials to verify you are who you claim to be. Three of the most common credentials consist of what the user knows (password), what the user has (security token) and what the user is (biometric verification).

Additional MFA verification credentials can include a time factor and a location factor.

Knowledge Factor:

Is a password hopefully using a unique combination of letters, numbers and symbols. With increased CPU speeds, brute-force attacks and password decrypting software are growing more intelligent and faster. If a password is exposed which has been used for multiple accounts, without MFA the malicious users will have access to your sensitive data and may even have access to the entire network.

Possession Factor:

A popular MFA verification method is to generate a security token or one-time use password (OTP) using your phone or email address. The advantage of using possession factor identification is that the browser or app will often remember your device or IP address. This means you only have to perform an MFA when logging in from a new phone or computer.

Another form of possession factor is having physical token access such as key cards or key fobs.

Inherence factors:

The inherence, or biometric, verification method requires a fingerprint scan, retina scan, iris scan, facial recognition or voice recognition.

Time Factor:

Current time can be considered as a fourth option for MFA. If you login from Canada and two hours later are attempting to log in from Russia that’ll send a red flag and lock out the malicious user. Some MFA’s only allow logins during a specific time frame, let’s say, during an 8-hour shift.

Location Factors:

With smartphones attached to our hip’s, location factors are a great secondary fourth or even fifth option for MFA. Allow the chosen app or browser to use your GPS and If a login attempt is happening in a location that is halfway across the globe it’ll trigger a lockout.

Oftentimes you have to grant access for MFA’s to be activated while using an app. You can find this access typically in the application settings. If you are using an app that doesn’t have the technology, we highly suggest using third party MFA’s, or not use the app altogether. Your identity is too important to risk and we’d consider reaching out to the developers and asking for an MFA update. 

Having a Multi-factor authentication is an excellent way to add an extra security layer to your system. It will prevent malicious activity on your network, keeping your sensitive data safe and secure. We suggest you allow Multi-factor authentication everywhere it can be used and if you don’t have the capabilities perhaps it’s time to invest in a little extra digital security.

If you want to learn more about Multi-factor authentication or how to implement it onto your devices and networks AlphaKOR can help! We have experts available to answer any of your or your employee’s questions so you can take the next step to assure your company remains digitally secure. We offer knowledge resources, security implementation, and employee training at your convenience.

We also offer tips and tricks to take your security knowledge to the next level with our Free eBook “10 things your IT technician wants you to know”. You can never be too safe in this digital era, and by being proactive with your digital security you can prevent emergency situations that would cost your company time and money.

Source: searchsecurity.techtarget.com & nist.gov