094 90 48200     Get SUPPORT

Aniar IT Services Blog

Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

Researchers at Duo Labs, using data compiled by Survey Sampling International, designed a survey that would mimic the patterns that could potentially be seen in different regions concerning the adoption rate of 2FA. The results of this survey were striking, as they revealed that only 28% of those surveyed--designed to match up to the entirety of the US population--had adopted 2FA. Over half of the participants had never even heard of 2FA before the survey was administered.

The researchers were also surprised to find that, of those who knew about 2FA, 54% were voluntary adopters, and only 20.8% had been introduced to 2FA in their work environments. However, reflecting upon the number of applications and services that now prompt users to set up some form of 2FA, this is hardly surprising. Yet despite the relatively high number of voluntary adopters, less than half of these respondents used 2FA wherever they could.

However, there were a few results that showed a bit more hope for the utilization of 2FA. First of all, an analysis of the state of 2FA that compares the authentication options in 2010 to those in 2017, shows that more people are relying on more secure methods. For instance, the use of hard tokens (or a physical device used to confirm the bearer’s identity) decreased by half in the span of time the analysis covered. This indicates an increased awareness in the potential security risks that a hard token presents--all it would take is for one of these tokens to be lost or stolen to render 2FA ineffective.

The real takeaway from the results of this research is an insight into user behavior. Namely, convenience and simplicity were important factors when a user formed an opinion of the different approaches to authentication. This helped to contribute to security tokens being ranked as the most trustworthy form of 2FA by 84% of respondents. While there was an awareness that these tokens had their issues (including the risk of losing them, as referenced above) there was still a demonstrated trust in their reliability.

Despite all this, the sad truth persists that too few people are utilizing 2FA to secure their personal and business devices. With any luck, this will change in the near future, as network security has been thrust further into the public consciousness due to the repeated breaches and attacks that have made headlines as businesses rely more heavily on computing resources.

Do you have 2FA in place to protect your business resources? For help implementing it and other crucial security measures, reach out to Aniar IT Services at 094 90 48200 .

Tip of the Week: How to Type Accent Marks and Symb...
11 Ways to Enhance Android Security


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Google Data Backup User Tips Email Microsoft Data Recovery Cloud Business Computing Network Security Hardware Data Hackers Innovation Internet VoIP Malware Cloud Computing Android Business Mobile Devices Managed IT Services Communication Workplace Tips Browser Hosted Solutions Smartphone Smartphones IT Support Communications IT Services Windows 10 Internet of Things Small Business Chrome How To Network Artificial Intelligence Backup Outsourced IT Business Continuity Spam Computer Computers Word Software Cybercrime Applications Efficiency Windows Information Office 365 Collaboration BDR Saving Money Business Management Cybersecurity Data Protection Mobile Device Management Facebook Two-factor Authentication Productivity Passwords Connectivity Data Security Ransomware Router Server Gadgets Money Miscellaneous Vulnerability Managed Service App Paperless Office Save Money Social Media BYOD Google Drive Windows 7 Managed IT services Holiday Telephone System Redundancy Voice over Internet Protocol Identity Theft Telephone Systems Remote Monitoring Mobile Device IT Plan OneNote Social Engineering Settings Virtualization Avoiding Downtime Phishing Sports Apps Software as a Service Unsupported Software Comparison Data Storage CES Fraud Encryption Microsoft Office Google Docs Human Resources Infrastructure Law Enforcement Keyboard Spam Blocking Content Management Telephony VPN Website Virtual Assistant Scam Managed IT Password Bring Your Own Device Blockchain Business Intelligence Upgrade Operating System IT Management Update Amazon Web Services Accountants HBO Legal Automation Firewall Meetings Botnet Telecommuting Password Manager Nanotechnology Password Management Solid State Drive HIPAA USB MSP Downtime Disaster Recovery Wireless Charging Inventory Servers Bing Windows 10s Computer Care Skype Entertainment Warranty Screen Mirroring Outlook Government Criminal Digital Signature Unified Threat Management Wi-Fi Employer-Employee Relationship Travel Remote Work Business Mangement Smart Tech NIST Audit Physical Security Patch Management Electronic Medical Records Wire File Sharing Root Cause Analysis Tools Work/Life Balance Google Apps HVAC Help Desk Private Cloud Start Menu Online Shopping Machine Learning Printer Augmented Reality Cast Frequently Asked Questions Recovery Addiction Sync Multi-Factor Security Credit Cards PDF Mobile Computing Gmail Cryptocurrency WiFi Data Management Training Millennials Workers Access Control Public Cloud Evernote Cleaning YouTube Mouse The Internet of Things Excel Smart Office Data loss Recycling Devices Safe Mode Computer Fan Flash Remote Worker Value Workforce Authentication Networking Shortcuts Software Tips Specifications Practices Microchip Big Data Tip of the week Cache Trending Amazon Document Management Camera Cortana Alert eWaste Thought Leadership FENG HaaS Staff Wiring Bandwidth Enterprise Content Management Wireless Internet Charger Hosted Computing Search Engine Windows Server 2008 Printers Domains Wireless Hiring/Firing Emergency Windows 10 Fun Public Speaking Twitter Presentation Lithium-ion battery Compliance Wireless Technology 5G Tech Support Safety Hard Drives IBM Marketing Hacker Search Productivity Regulation Quick Tips Budget Competition Customer Relationship Management IP Address CrashOverride Company Culture Users Mobility Customer Service Mobile Office Managed Service Provider Managing Stress