Contact Us Today! 800-626-8277

One World Technology Inc. Blog

One World Technology Inc. has been serving the Medina area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

Researchers at Duo Labs, using data compiled by Survey Sampling International, designed a survey that would mimic the patterns that could potentially be seen in different regions concerning the adoption rate of 2FA. The results of this survey were striking, as they revealed that only 28% of those surveyed--designed to match up to the entirety of the US population--had adopted 2FA. Over half of the participants had never even heard of 2FA before the survey was administered.

The researchers were also surprised to find that, of those who knew about 2FA, 54% were voluntary adopters, and only 20.8% had been introduced to 2FA in their work environments. However, reflecting upon the number of applications and services that now prompt users to set up some form of 2FA, this is hardly surprising. Yet despite the relatively high number of voluntary adopters, less than half of these respondents used 2FA wherever they could.

However, there were a few results that showed a bit more hope for the utilization of 2FA. First of all, an analysis of the state of 2FA that compares the authentication options in 2010 to those in 2017, shows that more people are relying on more secure methods. For instance, the use of hard tokens (or a physical device used to confirm the bearer’s identity) decreased by half in the span of time the analysis covered. This indicates an increased awareness in the potential security risks that a hard token presents--all it would take is for one of these tokens to be lost or stolen to render 2FA ineffective.

The real takeaway from the results of this research is an insight into user behavior. Namely, convenience and simplicity were important factors when a user formed an opinion of the different approaches to authentication. This helped to contribute to security tokens being ranked as the most trustworthy form of 2FA by 84% of respondents. While there was an awareness that these tokens had their issues (including the risk of losing them, as referenced above) there was still a demonstrated trust in their reliability.

Despite all this, the sad truth persists that too few people are utilizing 2FA to secure their personal and business devices. With any luck, this will change in the near future, as network security has been thrust further into the public consciousness due to the repeated breaches and attacks that have made headlines as businesses rely more heavily on computing resources.

Do you have 2FA in place to protect your business resources? For help implementing it and other crucial security measures, reach out to One World Technology Inc. at 800-626-8277.

Tip of the Week: How to Type Accent Marks and Symb...
11 Ways to Enhance Android Security


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 23 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Privacy Cloud Best Practices Technology Network Security Business Computing Managed IT Services Backup Hackers Hosted Solutions Software Malware Outsourced IT VoIP Email Google Business Continuity Microsoft Business Data Disaster Recovery Data Backup IT Support Windows 10 Efficiency Smartphones Android Saving Money Mobile Devices Cybercrime Ransomware Cloud Computing Browser Productivity Data Recovery IT Services Hardware Small Business Alert Communications Internet Innovation Computer Office Computers Business Management Internet of Things Law Enforcement Cybersecurity User Tips Managed IT Smartphone BDR Server Virtualization Chrome Work/Life Balance Telephone Systems How To Productivity Mobility Collaboration Tech Term Communication Passwords Windows Data Security App Mobile Device Management Remote Monitoring Password Data Protection Quick Tips Firewall Business Intelligence Phishing Budget Social Engineering Private Cloud Artificial Intelligence Wi-Fi Managed IT Services Social Media Save Money Flexibility Holiday Health Hacking Avoiding Downtime Office Tips Two-factor Authentication Data Breach Information Technology Money Applications Redundancy Network Bandwidth Office 365 Router BYOD Value Mobile Device Recovery Big Data Facebook Compliance Gadgets Bring Your Own Device HaaS Automation Spam Vulnerability Miscellaneous Apps Identity Theft Proactive IT Scam Automobile Computing Infrastructure Word Black Market Data loss Hiring/Firing Risk Management PDF Workplace Tips Battery Credit Cards Marketing Data Management Government Google Drive Smart Tech Cleaning Solid State Drive History Computer Care Microsoft Office Infrastructure End of Support Legal Data Storage Employer-Employee Relationship HIPAA Comparison Content Filtering Windows 10 Update Worker Business Owner OneNote IT Management Managed Service Provider Keyboard Document Management Spam Blocking SaaS Two Factor Authentication IT Plan Training Save Time Operating System Upgrade Public Cloud Website VPN Unsupported Software Electronic Medical Records Remote Computing Workers Charger Patch Management CES Public Computer Theft Audit Trending Network Congestion Content Management IoT Addiction Emails Servers Unified Threat Management Troubleshooting Transportation Cortana hacker Botnet Screen Mirroring Lifestyle Employer Employee Relationship Politics Blockchain Instant Messaging Hard Drives Education Cache HBO Fraud Files Flash Benefits Google Apps Internet Exlporer Computer Fan Travel Cast Mobile Computing Leadership Computer Accessories Human Resources Insurance Amazon Hosted Solution Safety Smart Technology The Internet of Things Downtime Outlook Bluetooth Staff Search Practices Virtual Reality Amazon Web Services User Error Techology Netflix Sync Samsung Password Manager Internet exploMicrosoft Best Practice FENG Software as a Service Apple Frequently Asked Questions Digital Signature How to Hosted Computing Worker Commute Online Shopping Settings Telephony Networking Business Mangement Devices Data Warehousing Specifications iPhone webinar Excel Encryption Wireless Inventory Evernote Skype Loyalty IBM Content Gmail Advertising Wireless Technology Shadow IT Thought Leadership Millennials Conferencing Tip of the week Rootkit Strategy Books Access Control Wireless Charging Start Menu Supercomputer Audiobook Recycling Google Docs Relocation Streaming Media Workforce IT Support Windows Server 2008 Users Experience Analysis Authentication Fiber-Optic Mobile Entertainment eWaste Video Games Root Cause Analysis Content Filter Telecommuting Windows 7 Vendor Management Music Emergency Nanotechnology Cables Windows 10s Professional Services Assessment Voice over Internet Protocol Humor Current Events Criminal Hybrid Cloud Accountants Storage Software Tips Remote Work Regulations Wearable Technology Television Connectivity Unified Communications Colocation Tools Meetings Multi-Factor Security Knowledge Scalability Physical Security USB Webinar Wireless Internet IT solutions Robot WiFi CrashOverride Twitter

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *