Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Start Using Two-Factor Authentication Everywhere, Today

Start Using Two-Factor Authentication Everywhere, Today

It can be easy to slack off when it comes to good password practices. Many users still use the same password across multiple sites and often don’t use secure passwords. Password managers make this a lot easier, but it’s really two-factor authentication (2FA) that can make all the difference. Strong, unique passwords are still important (not all accounts offer two-factor authentication) but let’s talk about why you should always enable two-factor or multifactor on all of your accounts when possible.

Getting into my programs or logged onto different websites has been easy enough by using a password management tool, especially since there are settings that can be enabled to remember a specific device. When logging on from a different device, my phone or email is immediately hit with a notification. It’s a PIN, and without the PIN there is virtually no chance of logging in. This might be annoying if my phone isn’t on me and I’m sent a text notification, but let’s be honest, I don’t go anywhere without my phone, it’s my most valuable tool. 

So, you might have tried 2FA before or you might have been endlessly hitting the “ask me later” option that you are prompted with on new software that implemented the additional authentication measures. Whether you decide to use it or not there is one indisputable statement regarding this feature: two-factor authentication makes your accounts more secure. 

What Is Two-Factor Authentication

Even if you haven’t used 2FA, you’ve probably seen it in action. In fact, many sites, like bank accounts, Google, and Facebook might force a type of 2FA on you. If you’ve ever logged into a website from a different computer and then received an email or notification on your phone that a login from an unknown location just happened - that’s two-factor authentication. Albeit, it’s the reactive version that doesn’t do much to prevent others from gaining access to your information. Let’s not rely on being reactive, and look at true two-factor authentication.

By definition, two-factor or multi-factor authentication is an authentication method in which a computer user is granted access only after successfully presenting two pieces of evidence to an authentication mechanism: knowledge, and possession.

Knowledge: This is your password. You’ve memorized it or stored it securely in a password manager. The idea is that only you know it or have access to that information. In events where you don’t know your password, some sites might also accept your full email address or phone number in order to reset your password.

Possession: This is something that you own and almost always have in your possession. This is typically your smartphone, but other methods might have you carrying around a USB thumb drive or an electronic key that generates a random number.

The instantaneous code that is sent provides one more feature. It acts as an informant. If somebody were to log into one of my accounts with my password, I would find out instantly. Even then, they wouldn’t be able to get the PIN from my text message or authenticator app to finish the login process. This tells me I should change my password immediately, but otherwise my account should be safe.

Don’t Assume You are Safe

Enabling two-factor authentication won’t entirely protect you from threats or breaches. If you have two-factor set up on Facebook, Facebook can still get breached and passwords could be stolen. We see this happen all the time, with high profile attacks on large online entities stealing millions of records in a shot.

Following the other password best practices, like using strong passwords and never using the same password on two accounts is critical.

Recently, we saw the launch of Disney+, and it was reported that several thousand users had their brand-new accounts hijacked within hours of the launch of the service. This wasn’t because Disney was hacked; hackers just attempted to log in to steal accounts with emails and passwords they already had from some other data breach. 

Phishing attacks are plaguing millions of inboxes every single day. These attacks replicate the website in which they are impersonating, with a realistic login screen. Users are tricked to go there, fill in their information, and the credentials are directly sent to the cybercriminals.

As previously mentioned, 2FA isn’t the fix-all to cybersecurity. It does however put one more step between you and an ill-willed cybercriminal. Voyage Technology has many more tips to help your business become more secure. If you would like to talk to one of our experts, give us a call at 800.618.9844. 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Users Ransomware Workplace Strategy Mobile Device Microsoft Small Business Quick Tips Backup Saving Money Cybersecurity Passwords Communication Data Backup Smartphone Managed Service Android Upgrade Business Management VoIP Smartphones Productivity Mobile Devices communications Data Recovery Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services AI Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Facebook Automation Miscellaneous Cloud Computing Gadgets Information Covid-19 Holiday Managed Service Provider Remote Work Training Server Outsourced IT Compliance Encryption Spam Employee/Employer Relationship Windows 10 Office IT Support Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Vendor Apps Two-factor Authentication Mobile Office Managed Services Voice over Internet Protocol Mobile Device Management Chrome Gmail Networking Budget Apple BYOD App Employer-Employee Relationship Tip of the week Conferencing Office 365 How To BDR WiFi HIPAA Applications Computing Access Control Hacker Information Technology Avoiding Downtime Marketing Retail Analytics Office Tips Healthcare Augmented Reality Managed IT Services Storage Password Bring Your Own Device Big Data Router Virtual Private Network Operating System Computers Health 2FA Risk Management Help Desk Website Remote Workers Telephone Firewall Scam Data loss Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Remote Monitoring Social End of Support Vulnerability Vendor Management Solutions Going Green Physical Security Display Printer Customer Service Cybercrime Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Word Managed IT Service Outlook Maintenance Antivirus Downloads iPhone Money Humor Licensing Vulnerabilities Entertainment Safety Data Privacy Sports Images 101 Mouse Robot Mobility Telephone System Multi-Factor Authentication Cost Management Administration IT Management VPN Employees Meetings Integration Customer Relationship Management Settings Wireless User Tip Printing Modem Computer Repair Mobile Security Content Filtering Processor Hacking Presentation Holidays YouTube Data Storage Cryptocurrency Smart Technology Supply Chain Wireless Technology Video Conferencing Machine Learning Managed Services Provider Virtual Desktop Professional Services Saving Time Virtual Machines Data storage LiFi Server Management Regulations Compliance Hard Drives Windows 8 Private Cloud Identity Laptop Evernote Paperless Co-managed IT Superfish Bookmark Domains Drones Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care Financial Data Refrigeration Error History Halloween Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Public Speaking Connectivity IT Lithium-ion battery Upload Procurement Remote Computing Azure Hybrid Work Social Network Telework Hacks Cyber security Entrepreneur Scary Stories Multi-Factor Security Tech Human Resources Tablet IoT Communitications Dark Web Cables Fun CES Trends Supply Chain Management Deep Learning Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Undo File Sharing Regulations Star Wars IT Assessment Education How To Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Organization Mobile Computing Travel Social Networking Google Maps Smart Devices Ransmoware Search Techology Fileless Malware Digital Security Cameras Content Remote Working Application Best Practice Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Unified Threat Management Motherboard Data Breach Buisness Assessment Electronic Health Records IT solutions Permissions Workforce Unified Threat Management Directions Videos IBM Legal Business Growth Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Fraud Meta Cortana User Error Microchip Username Alt Codes Managing Costs Amazon Black Friday SSID Competition Point of Sale eCommerce Downtime Database Surveillance Hosted Solution Virtual Assistant Outsource IT Network Management Typing Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies Google Drive Tactics Development User Hotspot Transportation Small Businesses Knowledge Websites Mirgation Hypervisor Displays PowerPoint 5G Shopping Nanotechnology Optimization IP Address Google Docs Addiction Unified Communications Electronic Medical Records Language Employer/Employee Relationships Outsourcing Experience SharePoint Management PCI DSS Bitcoin Chatbots Running Cable Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Google Wallet Screen Reader Service Level Agreement Internet Service Provider Recovery Virtual Reality Computing Infrastructure Teamwork Hiring/Firing

Blog Archive