094 90 48200     Get SUPPORT

Aniar IT Services Blog

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Tip of the Week: Your Phone Can Work as Your Security Key

Tip of the Week: Your Phone Can Work as Your Security Key

If you’re like most people nowadays, your mobile phone is currently well within your reach (and that’s assuming you aren’t reading this blog on it). The fact that most people keep their phone on them at all times has greatly contributed to these devices becoming a part of any given work-related process. One major way is the implementation of two-factor authentication, which we’ll discuss as a part of this week’s tip.

As we begin, it is important that we acknowledge that the Android operating system has been granted FIDO2 certification. In other words, the FIDO (Fast IDentity Online) Alliance has given the Android OS their seal of approval in regard to the authentication standards that the Alliance has set.

What Does This Mean?

In very simple terms, any Android device running 7.0 or higher with the latest Google Chrome update installed can be used as part of a two-factor authentication strategy - more specifically, as a security key. This includes the support that FIDO2 offers for onboard fingerprint scanners as a means of identity authentication. Currently, this authentication standard is only supported by Android, with no indication of Apple devices incorporating it.

In no uncertain terms, this all means that passwords may soon be phased out.

Abandoning Passwords

Passwords have been the standardized form of authenticating one’s identity for quite some time, despite the potential issues that are present with them. How often have we seen just how many ways a determined cybercriminal has to obtain a password? Between insecure databases filled with credentials and unfortunately successful phishing schemes, millions of accounts have been exposed - and that isn’t even taking all the times an insecure password was guessed into account.

The biggest weakness that any password has is the fact that it can be shared at all, that someone other than the owner can use it. Over any other reason, this is why FIDO2 is likely to become as popular as it is expected to be. When was the last time you successfully shared a thumbprint with someone, after all? Furthermore, FIDO2 keeps all of the information that is pulled from its biometrics onboard the device, keeping it safe from being stolen on the Internet.

As an added bonus, FIDO2 won’t allow the user to input their fingerprint’s biometric data into websites that don’t have sufficient security measures in place.

How to Use Your Android Device as a FIDO2 Security Key

In order to leverage your Android device as a security key, you need to make sure that it meets a few benchmarks. First and foremost, you’ll need to be running at least Android 7.0, with the latest version of Chrome installed. You will also need to have Bluetooth activated, and a Google account with two-step verification enabled.

This is somewhat simple to do. Logging into your Google account, access the Security section. Here, you’ll find the option to activate 2-Step Verification. After a short process, your smartphone will work as a security key.

Authenticating Google Sign-Ins with Your Phone

As long as you have enabled both Bluetooth and Location on your mobile device, any Google service you try to access will prompt you to confirm the sign-in attempt via your phone. This process is exceptionally simple - all you have to do is press Yes on your phone and wait. Once you’ve done so, you can confidently access your Google account, securely. As more developers adopt FIDO2, this enhanced security will only appear more often.

What do you think of this new authentication method? Share your impressions in the comments! While you’re there, let us know if there are any other tips you’d like us to cover!

Virtual Reality has a Limitless Future
How to Mitigate Unhappy Online Opinions
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 15 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Productivity Best Practices Privacy Cloud Innovation User Tips Network Security Email Workplace Tips Hosted Solutions Internet Efficiency IT Support Microsoft Data Hackers Google Hardware Software Data Backup Data Recovery Business Communication Cloud Computing Cybersecurity Smartphones VoIP Small Business Tech Term Managed IT Services Communications Collaboration Mobile Devices IT Services Windows 10 Phishing Gadgets Backup Android Computer Mobile Device Users Malware Business Continuity Browser Artificial Intelligence Saving Money Smartphone Outsourced IT Network Internet of Things Miscellaneous Windows Information Disaster Recovery Business Management Facebook BDR Server Upgrade Spam Managed Service Router Chrome Office 365 How To Social Media Quick Tips Automation Passwords Microsoft Office Computers Data Security Applications Data Storage Windows 7 Blockchain BYOD Paperless Office Holiday Apps Word Cybercrime Remote Monitoring Connectivity Settings Money Virtualization Display Encryption Managed IT Infrastructure Human Resources History Networking Mobile Device Management Bandwidth Staff Government Data Breach Vulnerability Two-factor Authentication Wi-Fi Operating System Remote Work Patch Management Data Protection Save Money HIPAA Ransomware Telephone System Vendor Procurement Private Cloud IT Plan OneNote Help Desk Google Docs Machine Learning Access Control Compliance Digital Signage Law Enforcement Big Data Sports Cryptocurrency Telephony Employee/Employer Relationship Website CES Unsupported Software Fraud Software as a Service Scam Training Update Mobile Office Business Intelligence Keyboard Content Management VPN Spam Blocking Botnet Processor Password Virtual Assistant Managed IT services Bring Your Own Device Redundancy Voice over Internet Protocol Vendor Management IT Management Business Technology App Telephone Systems Hard Drive Meetings Health Social Engineering Augmented Reality Google Drive Avoiding Downtime Servers Education Managed Services Provider Identity Theft Comparison Audit Cables Trend Micro Online Shopping Root Cause Analysis NIST Supply Chain Management Addiction Unified Threat Management PDF HVAC Flash SMS Gmail Cast File Sharing ISP Value Workforce OLED Using Data Credit Cards Printer Tip of the week Remote Computing IT Assessment Workers Specifications Batteries PCI DSS Data Management Default App Shopping Evernote Cleaning Trending Managed Services Public Cloud Mobile Computing HaaS Virtual Machine AI Recycling Devices Cryptomining Biometric Security Information Technology YouTube Mouse Windows Server 2008 Windows Server 2008 R2 OneDrive Authentication Data loss Google Search Virtual Private Network Computer Fan IT Infrastructure Social Network Practices Safe Mode Security Cameras Covid-19 Cache Software Tips Policy Smart Office HBO Computing Amazon Shortcuts Hypervisor Remote Wireless eWaste Thought Leadership Remote Worker Database Telecommuting Manufacturing Microchip Computer Care Copiers Cortana Alert Save Time Remote Workers FENG Outlook Investment Printing Charger Hosted Computing Smartwatch Skype Peripheral Wireless Internet Procedure Document Management Camera Virtual Reality Professional Services Amazon Web Services Accountants Enterprise Content Management Mobility Going Green Legal Wiring Travel Search Engine Development Password Manager Nanotechnology Proactive IT Tools Work/Life Balance Managed IT Service Printers Frequently Asked Questions Recovery ROI Personal Wireless Charging Inventory Start Menu Project Management Quick Tip USB Solid State Drive FinTech Cabling Fiber Optics Downtime Password Management Social Sync Multi-Factor Security Saving Time Office 5G Criminal Twitter Windows 10s Firewall Bing WiFi Messaging Business Mangement Smart Tech Screen Mirroring MSP Net Neutrality Millennials Digital Signature Entertainment Warranty Excel GDPR Digitize Hacker Google Apps Employer-Employee Relationship Employee Bitcoin The Internet of Things Regulations Electronic Medical Records Wire Physical Security Budget Financial Competition Customer Relationship Management IP Address Hard Drives Search Customer Service Regulation Domains CrashOverride Company Culture Emergency Windows 10 Public Speaking Managed Service Provider Presentation Managing Stress Lithium-ion battery Hiring/Firing Tech Support Wireless Technology Fun Personal Information Safety IBM Marketing Productivity