A Double Scoop of Security with 2FA

It’s now, regrettably, common knowledge that usernames and passwords can be compromised. Although businesses and employees have become wise to more simple, predictive passwords, the risk of your password still being hacked remains high.

Just this month, guidance from the National Cyber Security Centre (NCSC) highlights how imperative 2 Factor Authentication (2FA) is when it comes to protecting important data in your business and at home.

Rather than continuing to increase the length and obscurity of passwords, the NCSC now recommend using a double layered approach for logging-on, to anywhere that holds sensitive or important information, called 2 Factor Authentication.

What is 2FA?

2 Factor Authentication is an extra scoop of security. Where the username & password is the first scoop, 2FA is the second. 2FA is a second factor using something that you, and only you, have access to. This means, even if your username & password is compromised, the hacker will find it extremely difficult to gain access to your account.

Flavours of 2FA

There are different types and methods of 2FA. Some of the most common include:

Authenticators - once the username & password has been entered, the user will receive a push notification on their mobile device (phone or tablet) where they can choose to accept or decline the request.

Hardware tokens - a physical key fob that generates a random number for the user, alongside their usual passwords.

Text messages - once the user has typed in their password, the 2FA system will text the mobile device a random number, which is then entered to complete the log in process. More recent studies suggest that texts still have the potential to be intercepted by hackers and other means of 2FA would be preferable.

When should you use 2FA?

The NCSC recommend you use the 2FA process whenever it’s imperative it's you and not a hacker.

Scenarios 2FA should be used would be:

  • Remote working and therefore not on the internal business network
  • Setting up a new payee for your bank account
  • Changing a password
By following the 2FA process when it counts, it means hackers cannot access your critical information and the user isn’t being checked at every moment of the day.

Taste test

Some services already have 2FA solutions built in to their log in procedure, however many still don't.

If it is available, but not turned on, you will need to visit the security settings option in your account, usually titled '2 step verification'.

If you'd like to check to see if your email has already been compromised please visit website www.haveibeenpwned.com.

Flavour of the month

Datcom have been using 2FA methods for some time now and have helped set up customers with the same double layered approach. Businesses have found it easy and none intrusive to use, with fears over time spent quashed once they see how simple it is.

If you're unsure about which 2FA method is right for your business or would like assistance setting up the scheme please contact Datcom on the details below.

Get in touch

Call us on 0333 000 3210 or Email us hello@datcom.co.uk

  •  
    We use Datcom for 3rd line support and for advice when planning for growth and development. They always offer considered and well thought out ideas and suggestions and are like an extension of our own team.

    CIS Manager

    Inzpire Ltd

  •  
    Our servers, systems and network are fully managed and monitored by Datcom. With the historical monitoring data, they can predict trends and spot issues on the network so they are resolved before they become a critical issue

    Managing Director

    Korbond