Keeping You and Your Data Connected

Blog

Gennix Tech Blog

That Was Easy - How 2-Factor Authentication Makes Your Cloud Computing Much Safer

 

How many times have you seen in a movie where the protagonist, in pursuit of justice, approaches a locked door, and to get in, the gatekeeper demands they utter the password. The tension builds as the hero panics with only one chance to get it right. To their amazement, they answer correctly, the audience breathes a sigh of relief, and the plot moves forward.

Later, as you pick the popcorn bits out of your teeth, you wonder why the gatekeeper would let anyone in with just a password. It doesn't seem like a great system, does it? If the gatekeeper demanded a password and some type of token, well, the movie might have ended right there.

Cloud computing users often treat their data like the weary gatekeeper in that they only use a password to gain access to their online accounts. The problem is those accounts are like doors that anyone on the planet can knock on. If a hacker has harvested a user's password on the dark web, they can easily give it a try at all the websites the user frequents. Users who are in the bad habit of reusing their favourite passwords are especially vulnerable to this relatively simple attack.

By now, you have likely heard of 2-factor authentication (2FA), but perhaps you are not sure what it is. When implemented, 2-factor or multi-factor authentication (MFA) secures your online accounts by requiring the user to produce two or three forms of verification, like the following.

  • Something you know, like a password.

  • Something you have, like a trusted device (cell phone or computer).

  • Something you are, like fingerprints, iris recognition, or face scan.

2FA is orders of magnitude more secure than a password alone because even if an attacker has your password, it's useless without the other verification.

So how do you use 2FA or MFA to secure your data? The easiest way to implement it is by installing an authenticator app on your cell phone. Microsoft, Google, Authy, and others have apps that generate a new, unique code every 15 or 30 seconds. When logging in to an online account, you type in your password (which should be strong and unique to that account), then type in the code from the authenticator app. Voila, you're in, with minimal effort, and your data is way more secure!

Other 2-factor verification methods you may be familiar with are SMS messages, voice calls, security questions, and verification emails. These methods are ok but not as secure as using an authenticator app.

Biometric verification is also becoming more prevalent. We see smartphones using fingerprint and face recognition technology to unlock the device, but biometrics alone are not adequate as a single factor authentication. However, they are an excellent additional layer of security (in this case, multi-factor authentication) when paired with passwords and uniquely generated codes.

At Gennix, we are encouraging our clients to enable 2FA wherever it is available. If an online account lets you use an authenticator app, then using 2FA is very easy! Even if the method offered is not quite as convenient, it is still well worth the effort to protect your online data.  

Microsoft and other services are beginning to force users to use 2FA to thwart hacking, so it's a good idea to implement it now and avoid panic later when you don't have the time to deal with the requirement.

I found a short YouTube video by local Vancouver tech personality Steve Dotto that has a nice demo on how to use 2-factor authentication. If you want to see 2FA in action click here.

If you have any questions about 2-factor or multi-factor authentication, feel free to reach out to our team for answers or assistance with your particular setup.

As always, we're here to help.

Ren

Spring-into-Security-LinkedIn-100.jpg
 
 

Are you ready for help securing your cloud accounts?
Email Ren now!