Cyber Protection Group – Penetration Testing Company
Penetration Testing, Incident Response, PCI Assessments #cybersecurity #infosec #itsecurity
814.799.0274
  • Penetration Testing
  • Business Technology Services
  • Computer Support Services
    • Home Computer Repair
    • Business Computer Repair
    • Remote Support
  • About
  • Contact Us

    Two-Factor Authentication – Proactive Security

    May 24, 2019
    two-factor authentication

     

     

    Two-Factor Authentication

    two-factor authentication

    In 2019, the world is seeing first hand, the rise of cyber attacks. As a result, we have have seen many attacks focused on large companies worth millions.

    Further, individuals logging into Facebook or their online banking are targets as well.

    Hackers target everyday people that are not aware of security regulations and procedures like a large company where such items are required. In everyday life, they are not. Consequently, individuals appear as easy targets due to the lack of security knowledge.   

    To combat this, strong password appears to be the best defense. However, strong passwords are beginning to not be enough to keep malicious users out of online accounts.

    Fear not, measures can be put in place to make sure the everyday user is protecting their accounts their information is secure. This is where two-factor authentication or 2FA comes into play.

     

    What is two-factor authentication?

    To begin, 2FA is an additional layer of security for an account. For example, the user would enter their password, and then receive a code from an email, text, etc, that they would have to enter before being able to login.

    2FA is also as simple as entering your zip code when you pump gas. The two part component of the authentication is a way to have a a secure verification of person or a payment. therefore, securing a login or transaction.

     

    How is 2FA used?

    A majority of social media, banking, and other online accounts offer / utilize 2FA. With the added layer of security, it is beneficial for the user and the provider.

    One, the user information is secure. Two, the company is being proactive with the security measures.

    Although it is not immediately required for the user to login using 2FA, most applications have a section in the privacy or security settings where you can, as the user, decide to turn on the 2FA feature.

    The images featured below are an example of how to turn on and use 2FA in an Instagram account.

    Steps to enable 2FA on Instagram

    1. Go to settings

    two-factor authentication

    2. Select privacy and security

    2fa

    3. Select two-factor authentication

    two-factor authentication

    4. Select method of authentication (text or application)

    two-factor authentication

    5. Receive verification

    two-factor authentication

    2FA is now complete for the Instagram account.

    Pros and Cons

    In conclusion, from a professional standpoint, strong account security is always a good idea. 2FA makes it more difficult for a hacker the gain access to your account.

    Further, if they were able to guess your password, it would be extremely difficult for said hacker to bypass the 2FA feature.

    They would have to know the verification code that is sent you your device and by that point, attacking your account may not be worth the trouble.

    Some may see the additional entering of a code / pin as a burden or inconvenience, but it the grand scheme of things, one may say it is worth it to keep your information safe.

     

    By, Taylor Ritchey

     

    Sources

    [1]    /    [2]

     

    Check of our last article on biometrics!

    Post navigation

    A Look at Biometrics
    Creating a Strong Password

    Free Sample Penetration Testing Report

    Click here to download your free penetration testing report!

    Recent Stories

    • Appalachia Technologies Acquires Cyber Protection Group February 16, 2022
    • United States Improves Critical Infrastructure Security May 19, 2021
    • Hacking Group Stops Oil Pipeline and Breaks 45% of the United States Oil Supply May 10, 2021
    • What is Penetration Testing and Why Do You Need It? May 10, 2021
    • Quick! Update Your iPhone and iPad! May 3, 2021

    Unable to load Tweets

    Follow

    WE'RE SOCIAL!

    Recent News
    • Appalachia Technologies Acquires Cyber Protection Group
    • United States Improves Critical Infrastructure Security
    • Hacking Group Stops Oil Pipeline and Breaks 45% of the United States Oil Supply
    • What is Penetration Testing and Why Do You Need It?
    • Quick! Update Your iPhone and iPad!
    Pages
    • Blog
    • Penetration Testing
    • Security Vulnerabilities
    • Computer Support Services
    • About
    • Contact Us
    • Application and Website Security Testing
    • Wireless Penetration Testing
    • Top Penetration Testing Company at a Low Cost
    • Home Computer Repair
    • Home
    • Business Technology Services
    • Offering Vulnerability Assessments / Penetration Testing for only $3,950
    • Remote Support
    • Sample Penetration Testing Report

    Contact Us

     
    2230 Woodbury Pike, Ste. 1
    Loysburg, PA  16659
    814.799.0274