DROP US AN ENQUIRY / FEEDBACK

  • Name

  • Email

  • Company

  • Contact no.

Message

CAPTCHA Image   Reload Image
Enter Code*:

Thank you for your enquiry, we will get back to you shortly

Latest news 16 Aug 2016 - ACA Pacific Appointed by Autodesk as Regional Value Added Distributor
Latest news 14 Jul 2016 - Progress Named a Visionary in Gartner 2016 Magic Quadrant for Mobile App Development Platforms
Latest news 10 Aug 2016 - Autodesk Industry Collections Now Available Worldwide
Latest news 10 Aug 2016 - Ten Big Reasons to Scan Wirelessly in Pharmaceuticals & Healthcare
Latest news 09 Aug 2016 - Eaton’s Expanded Series of FD85 Thread to Connect Couplings Provides Additional Sizes for Reliable Connections in Oil and Gas A
Latest news 12 Jan 2017 - ACA Pacific Technology launches Alcatel-Lucent Enterprise Solutions across Asia Pacific

Beyond the Password: Why You Need 2-Factor Authentication

David Finger, director of product marketing for Fortinet said if you use an outside vendor for network security, adding the extra authentication layer can be as simple as taking advantage of an existing software capability on network security products you're already using. Does your company use two-factor authentication to protect its data? If not, maybe it's time you considered adopting the practice.

The Heartbleed bug is just the latest example of the vulnerability of regular passwords. For better protection, small businesses should consider taking security to the next level, with two-factor authentication.

That's what a company called Prevendra did. Its Red Folder app is designed to hold all of a consumers' important information, so it can be retrieved in case of emergency. Stored information includes bank account numbers; life insurance contacts; and even passwords, usernames and email addresses to access online accounts — the type of data you don't want unauthorized eyes to see.

To keep it safe, Red Folder, which is moving out of Beta format, is adding two-factor authentication to its security, said Christopher Burgess, president and CEO of Prevendra.

"Passwords have been in use since the late 1980s as the means to control access and, as such, rely on something you know — nothing more," Burgess said, explaining why he made the decision to go to two-factor authentication. "Two-factor authentication, by design, separates two separate issues: what you know and what you have." That is, the security measure requires you to both know a password and have access to your cell phone, for example.

For businesses that regularly make remote access to the network, whether through a virtual private network (VPN) or by checking email on a smartphone, two-factor authentication is much safer and more secure than a simple password. Yet, small businesses too often decide not to implement this type of authentication. Mustaca thinks this is due to a lack of understanding about the method, and because businesses take an all-or-nothing approach. Not every situation will call for two-factor authentication, he said.

"Companies should use two-factor authentication to protect assets which are easily stolen and which can be attacked from outside. Any other situation should be properly analyzed, and the risks should be mitigated properly before adding the extra protection," Mustaca said.

Small businesses should also consider two-factor authentication for internally shared environments. This adds a layer of protection to keep employees from accessing unauthorized files and applications.

A second authentication factor secures external connections, as well, allowing the business to verify its customers and customer data. This extra protection also shows customers that your business takes their security and privacy seriously.

Adding two-factor authentication to applications can be as simple as turning on the options already available. Web-based email, social media sites and cloud applications like Dropbox now utilize two-factor authentication, for example. If you use an outside vendor for network security, adding the extra authentication layer can be as simple as taking advantage of an existing software capability on network security products you're already using, said David Finger, director of product marketing for Fortinet. Keep in mind that costs will go up for more-sophisticated measures like biometrics or when adding hardware like tokens.

Whatever type of two-factor authentication a business uses, in the end, it justifies the time and the expense, experts said. And luckily, many of today's soft-token methods make the practice easy and affordable for the average small business.

"I think we have all received password reset notices — whether in response to the recent openSSL vulnerability, Target data breach or otherwise — which underscores the importance of stronger authentication methods than the traditional user name and password," said Finger. "Security measures like this are especially important when we consider the growing incidence of data theft, the potential impact of an incident on the business, and how integral each smaller business is to the livelihood of its owner and employees."

About Fortinet
Fortinet (NASDAQ: FTNT) helps protect networks, users and data from continually evolving threats. As a global leader in high-performance network security, we enable businesses and governments to consolidate and integrate stand-alone technologies without suffering performance penalties. Unlike costly, inflexible and low-performance alternatives, Fortinet solutions empower customers to embrace new technologies and business opportunities while protecting essential systems and content. Learn more at www.fortinet.com

Link: http://www.businessnewsdaily.com/6307-2-factor-authentication-why-passwords-leave-you-vulnerable.html

For more details you may contact
KC Foo  |  03-7803 4600  |  kc.foo@acapacific.com.my

Product Search

 

Contact Us

  • ACA Pacific Technology (M) Sdn Bhd
  • + 60 (3) 7803 4600
  • + 60 (3) 7804 6017
  • Penang Office
  • + 60 (4) 619 2593
  • + 60 (4) 619 2693

Our Vendor Profile

vendorprofile