Two factor authentication secures SMEs

One of the most anticipated video games of 2012 was recently released. The only problem is, the company that developed the game didn’t apply enough security to accounts, and a large percentage of players had their accounts hacked and items stolen. Interestingly enough, this is also happening to many small businesses; their data is being stolen. This can be avoided with stronger security measures, such as two factor authentication.

Two factor authentication is a method of accessing something through the use of two different “factors.” There are actually three different factors a user can use for authentication, but you only need to use two. The three factors are:

  1. Something the user knows. This is the most commonly used factor in all authentication, and can be something like a password or a PIN. This also includes the security question asked when you forget your password.
  2. Something the user has. This is the most common second factor of authentication and is typically a device or physical object the user has. Objects can include key fobs where you press a button to get a randomly generated code to enter, a credit/ATM card or an ID card.
  3. Something the user is. This is a less common form of authentication, especially for small businesses, as it relies on a physical attribute of the user like a fingerprint.

When a company uses two of these factors to authenticate users, they are using two factor authentication. Chances are high, you already use this with your bank or another organization.

Should small businesses implement two factor authentication?
In a recent report published by Verizon Business, businesses with 11-100 employees were by far the most targeted groups with 57% of data breaches. Businesses with 101-1,000 employees were the next most targeted with slightly under 10% of data breaches. The report goes on to suggest that the main reason small businesses are being targeted is because of generally lax security.

Before you rush out and implement a two factor authentication system, you need to be aware that it will not prevent all attacks, two factor authentication can still be hacked. It just takes more time and effort than most hackers are willing to invest to hack into systems that use this form of security. Before you implement any new security measures be sure to talk with your IT support provider or an expert like us, we may have a solution that fits your business.

Published with permission from Source.

6.4M LinkedIn passwords compromised

On the Internet you have very little privacy. One thing that’s private, or should be, are your passwords. Many business managers know this, and go to great lengths to ensure that their passwords are secure. Yet there are times when passwords are leaked, often this isn’t your fault. This recently happened with LinkedIn.


3 BI myths you should be aware of

One of the most popular trends small businesses are implementing is Business Intelligence (BI). There are many benefits to BI that business owners are eager to cash in on. The only problem however is your employees may not think the same way, often seeing BI as a threat to their job security. This, and other, “myth” can create a workforce unwilling to adapt, and the common myths around BI should be addressed before implementation.


Did you know about these FB features?

The use of social media by companies to connect with their customers and drive brand awareness is commonplace among companies of all sizes. Using a site like Facebook and its numerous features allows small businesses to tap into a potentially large customer base. What many owners don’t know is that there are some hidden features that they could be using.


Don’t let business fail due to disaster

Many companies in North America, the UK and Australia tend to adopt an almost invincible point of view, they believe that disaster can never strike their business and are stunned when it does. This is a dangerous viewpoint to take, especially for small businesses who stand to be affected the most from any disaster.