094 90 48200     Get SUPPORT

Aniar IT Services Blog

Tip of the Week: Your Phone Can Work as Your Security Key

Tip of the Week: Your Phone Can Work as Your Security Key

If you’re like most people nowadays, your mobile phone is currently well within your reach (and that’s assuming you aren’t reading this blog on it). The fact that most people keep their phone on them at all times has greatly contributed to these devices becoming a part of any given work-related process. One major way is the implementation of two-factor authentication, which we’ll discuss as a part of this week’s tip.

As we begin, it is important that we acknowledge that the Android operating system has been granted FIDO2 certification. In other words, the FIDO (Fast IDentity Online) Alliance has given the Android OS their seal of approval in regard to the authentication standards that the Alliance has set.

What Does This Mean?

In very simple terms, any Android device running 7.0 or higher with the latest Google Chrome update installed can be used as part of a two-factor authentication strategy - more specifically, as a security key. This includes the support that FIDO2 offers for onboard fingerprint scanners as a means of identity authentication. Currently, this authentication standard is only supported by Android, with no indication of Apple devices incorporating it.

In no uncertain terms, this all means that passwords may soon be phased out.

Abandoning Passwords

Passwords have been the standardized form of authenticating one’s identity for quite some time, despite the potential issues that are present with them. How often have we seen just how many ways a determined cybercriminal has to obtain a password? Between insecure databases filled with credentials and unfortunately successful phishing schemes, millions of accounts have been exposed - and that isn’t even taking all the times an insecure password was guessed into account.

The biggest weakness that any password has is the fact that it can be shared at all, that someone other than the owner can use it. Over any other reason, this is why FIDO2 is likely to become as popular as it is expected to be. When was the last time you successfully shared a thumbprint with someone, after all? Furthermore, FIDO2 keeps all of the information that is pulled from its biometrics onboard the device, keeping it safe from being stolen on the Internet.

As an added bonus, FIDO2 won’t allow the user to input their fingerprint’s biometric data into websites that don’t have sufficient security measures in place.

How to Use Your Android Device as a FIDO2 Security Key

In order to leverage your Android device as a security key, you need to make sure that it meets a few benchmarks. First and foremost, you’ll need to be running at least Android 7.0, with the latest version of Chrome installed. You will also need to have Bluetooth activated, and a Google account with two-step verification enabled.

This is somewhat simple to do. Logging into your Google account, access the Security section. Here, you’ll find the option to activate 2-Step Verification. After a short process, your smartphone will work as a security key.

Authenticating Google Sign-Ins with Your Phone

As long as you have enabled both Bluetooth and Location on your mobile device, any Google service you try to access will prompt you to confirm the sign-in attempt via your phone. This process is exceptionally simple - all you have to do is press Yes on your phone and wait. Once you’ve done so, you can confidently access your Google account, securely. As more developers adopt FIDO2, this enhanced security will only appear more often.

What do you think of this new authentication method? Share your impressions in the comments! While you’re there, let us know if there are any other tips you’d like us to cover!

Virtual Reality has a Limitless Future
How to Mitigate Unhappy Online Opinions
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 24 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy User Tips Productivity Email Cloud Google Hackers Tech Term Innovation Workplace Tips Internet Network Security Microsoft Hosted Solutions Data Efficiency Communications Data Backup Hardware Communication IT Support Windows 10 Cloud Computing Data Recovery Business Mobile Devices Small Business Software Android Managed IT Services Smartphones Malware VoIP Computer Smartphone Collaboration Gadgets IT Services Mobile Device Network Business Management Browser Users Backup Internet of Things Spam Artificial Intelligence Windows Information Phishing Office 365 Miscellaneous Router Chrome How To Server Cybersecurity Word Cybercrime Saving Money Computers Applications BDR Outsourced IT Business Continuity Windows 7 Staff Vulnerability Operating System Managed Service Microsoft Office Data Protection Paperless Office BYOD Holiday Ransomware Facebook Upgrade Remote Monitoring Social Media Connectivity Settings Money Data Security Display Mobile Device Management Encryption Data Storage Two-factor Authentication Passwords Processor Password Disaster Recovery Government Virtual Assistant Managed IT services Apps Blockchain Bring Your Own Device Redundancy Voice over Internet Protocol Automation IT Management App Telephone Systems Meetings Save Money Social Engineering Google Drive Avoiding Downtime Website Education Identity Theft Telephone System Comparison Private Cloud IT Plan OneNote Help Desk Google Docs Machine Learning Access Control Virtualization Digital Signage Law Enforcement Sports Cryptocurrency Telephony CES Unsupported Software Fraud Software as a Service Scam Training Managed IT Update Infrastructure Business Intelligence Wi-Fi Human Resources Keyboard Content Management Quick Tips VPN Spam Blocking Botnet Augmented Reality FENG Microchip Computer Care Bandwidth Cortana Alert Save Time 5G Camera Outlook Investment Charger Hosted Computing Smartwatch Skype Wireless Internet Document Management Virtual Reality Amazon Web Services Accountants Enterprise Content Management Mobility Hacker Vendor Management Legal Wiring Business Technology Travel Remote Work The Internet of Things Search Engine Patch Management Hard Drive Password Manager Nanotechnology Proactive IT Tools Work/Life Balance Frequently Asked Questions Recovery ROI Wireless Charging Inventory Health Start Menu HIPAA USB Solid State Drive Big Data Cabling Downtime Password Management Social Sync Multi-Factor Security Saving Time Criminal Windows 10s Firewall Digital Signature Servers Bing WiFi Business Mangement Smart Tech Screen Mirroring MSP Net Neutrality Millennials Entertainment Warranty Excel GDPR Google Apps Employer-Employee Relationship Employee Electronic Medical Records Wire Audit Physical Security Cables Online Shopping Root Cause Analysis NIST Vendor Procurement Addiction Unified Threat Management Credit Cards PDF HVAC Flash Gmail Cast File Sharing ISP Value Workforce OLED Printer Tip of the week Remote Computing Workers Specifications Wireless Data Management Default App Evernote Cleaning Trending Public Cloud Mobile Computing HaaS Virtual Machine Recycling Devices Cryptomining Biometric Security YouTube Mouse Windows Server 2008 Windows Server 2008 R2 Authentication Data loss Google Search Computer Fan HBO IT Infrastructure Practices Safe Mode Security Cameras Cache Software Tips Smart Office Manufacturing Amazon Networking Shortcuts Hypervisor eWaste Thought Leadership Remote Worker Database Telecommuting Company Culture Tech Support Emergency Wireless Technology IBM Safety Productivity Managed Service Provider Marketing Managing Stress Budget Printers Customer Relationship Management Hiring/Firing Competition IP Address Twitter Fun Personal Information Customer Service Mobile Office Financial Domains Compliance Windows 10 Hard Drives Employee/Employer Relationship Search Public Speaking Regulation Presentation Lithium-ion battery CrashOverride