25th June 2013
Two-factor authentication is sensible IT security, says Switch2IT
Switch2IT is 4 2FA!
The Switch2IT team is pleased to hear that a number of big consumer brands – including Apple, Google and Microsoft – are now offering their customers two-factor authentication (2FA) as a standard IT security measure.
Essentially, 2FA is a safer, more complex method of authenticating an account. The special web authentication systems rely on hardware-based security tokens that generate time-sensitive passcodes that must be entered along with a password. Or they can send one time codes to your mobile phone.
The main benefit of a two-factor authentication is that it is twice as secure as a password-only system. For example, if your credit card details were stored in your iTunes account, the 2FA process would make it much more difficult for a cyber-criminal with your Apple ID to make a purchase. The hacker would need to get through a second gateway. You can read more about two-factor authentication in web authentication scenarios at SearchSecurity.com.
IT security has come a long way…
This may not be a flawless system as yet but it is most definitely a step in the right direction, where IT security is concerned. Switch2IT has encouraged the use of 2FA as a minimum security measure for web service provider SMEs for many years. The system not only facilitates more secure online services which help to protect consumer account and credit card details but it also helps smaller businesses to quickly identify when a compromise on their own system has been attempted.
Would you like a review of 2FA for your business? Whether you are based in Hampshire, Sussex, Surrey, London or Kent, feel free to call the Switch2IT team today on 0800 0833416. Our technical support specialists will take the time to understand the needs of your business and your customers so that an increase in IT security will only positively affect your sales.
Now, if Twitter and LinkedIn could just master interoperability and put a stop to people pasting links that require viewers to log in before content can be accessed, then we would all save a little more time and take a another step in the right direction…
25th August 2017
The complexities of UK data protection law
Who does data protection law protect and what are the parameters? The Information Commissioner’s Office (ICO) recently published a blog that caused a few eyebrows to rise among the Switch2IT team. Steve Eckersley ICO Head of Enforcement, who aims to “take purposeful risk-based regulatory action where obligations are ignored, exam...Read More >
18th July 2017
What's the future for technology post-Brexit?
We realise there are an influx of “what-now-post-Brexit” articles circulating but there is no getting away from the fact that the decision of that marginal majority to pack their bags and move out of the EU will have (and is already having) a significant impact on UK businesses, especially with regard to data protection. What the Switc...Read More >
26th June 2017
Top tips for acing IoT cyber security
How to maximise Internet of Things cyber security for your business As the BBC's Jane Wakefield explains, “The Internet of Things is about connecting previously dumb objects, such as light bulbs and cameras, to the network”. While it is useful to have everyday objects implanted with software and sensors that make them “smart...Read More >
16th May 2017
Is Facebook leaving your business open to cyber security threats?
Is Facebook fun risking your business? Who have you seen live in concert? What is your pornstar name? Where were you born? These may all seem like innocuous enough questions – something to pass the time, get to know your Facebook friends better or a bit of a laugh – but have you considered the type of information you are sharing with t...Read More >