Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

According to Study, Only 28% Utilize Two-Factor Authentication

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.

Using data from Survey Sampling International, the researchers at Duo Labs created a survey to determine the adoption rate of 2FA. This survey was designed to mimic patterns throughout different regions to give an impression of how much 2FA was adopted, and was also targeted to a sample that was created to be proportional to the entire US population. The results of this survey provided some invaluable insights.

However, a few insights were more surprising than others. For example, only 28% used 2FA, and under half of all participants had ever heard of 2FA before taking the survey.

Yet of those who had heard of 2FA, 54% had adopted it voluntarily, and only 20.8% had first used it in their work environments. Considering the number of applications and services that encourage users to utilize 2FA as a security measure, these relatively high numbers make sense. What makes less sense is the fact that the researchers found that less than half of these voluntary adopters used 2FA at every opportunity.

Despite this, some of the survey’s results were a little more positive for the future of 2FA. Analysis of the current state of 2FA has shown a shift in how users authenticated their identities between 2010 and 2017, that shift indicating a reliance on more secure, safer methods. Hard tokens, or physical devices that a user carries to confirm their identity, have seen a decrease in use of about 50% in the time covered by this analysis. These tokens are relatively insecure, as they only need to be lost or stolen to potentially undermine the use of 2FA, so this decrease in their use shows an increase in security awareness and risk management.

Perhaps most importantly, this research provides real insights into the behavior of the user, and what they considered the most important reason to use certain 2FA methods.

Most users indicated that when they compared different approaches to 2FA, they held simplicity and convenience as their most important factors. This helps to explain why 84% of respondents ranked security tokens as the most trustworthy form of 2FA., when the security risks and issues are (as referenced above) well-known by users.

Still, the saddest truth revealed by this survey is that too few users utilize 2FA as they secure their devices, both personal and work related. Hopefully, the repeated security breaches and cyberattacks will help to change that, as the very real risk of data loss and how network security can prevent it is pushed further into the public consciousness.

The question now becomes, are your business’ resources protected by 2FA? If you want professional assistance in implementing it, and other critical security needs, give Telesys Voice and Data a call at (800) 588-4430.


No comments yet
Already Registered? Login Here
Saturday, 20 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Malware Business Computing Privacy Productivity Email Business Microsoft Internet Hosted Solutions Software Windows 10 Managed Service Provider Backup Computer IT Services Ransomware Network Security Mobile Devices Android Smartphone Managed IT services User Tips Social Media Outsourced IT Hardware Google Browser IT Support Workplace Tips Efficiency Communication Disaster Recovery Innovation Business Continuity Data Backup Data App Business Management Data Management Smartphones Small Business Office Upgrade Holiday Productivity Cloud Computing Windows Remote Monitoring Internet of Things Facebook Miscellaneous Data Recovery WiFi Server Microsoft Office Office 365 Network Artificial Intelligence Gmail Big Data Phishing Encryption Spam Tech Term Unified Threat Management Password Bandwidth Firewall Robot Apps Save Money Paperless Office Customer Relationship Management Hosted Solution Recovery Cybersecurity Customer Service Mobile Device Management Word Hacker Managed IT Services Saving Money Remote Computing How To Content Filtering Government Money Work/Life Balance Wi-Fi Infrastructure Office Tips Chrome Passwords Employer-Employee Relationship Document Management Apple Avoiding Downtime Tip of the week Risk Management Hacking The Internet of Things Mobile Computing Computers Alert Data Security Tech Support Applications IT Support Data storage Computing Operating System Education VoIP IT Management Presentation Cybercrime Business Growth Virtual Reality Mobile Device Antivirus SaaS Project Management BYOD Outlook Managed IT Social Data loss BDR Website Windows 10 Telephone Systems Compliance Two-factor Authentication Health File Sharing Settings Analytics Vendor Management Identity Theft Google Drive Websites Automation Physical Security Augmented Reality Going Green VPN Taxes Competition IBM Running Cable Botnet Printing Virtual Private Network Smart Technology Samsung Information Technology Assessment Server Management Licensing HIPAA Bring Your Own Device Router Search Humor Meetings Digital Payment Sports Storage Mobile Security IT service Cortana Analyitcs Maintenance Computer Care Virtualization Administration Training Safety IT solutions Specifications Tablet Wireless Technology Wireless Automobile Upgrades Budget Business Technology Downtime End of Support User communications Mouse Retail YouTube Collaboration Unified Communications Healthcare Legal Best Practice Lithium-ion battery LiFi Business Owner Patch Management Twitter Scam Politics Monitors Regulations Marketing Vulnerability Travel G Suite Processors Management Laptop Networking Fraud Hard Drives PowerPoint How To Heating/Cooling Legislation Fleet Tracking Virtual Desktop VoIP streamlines Operations Social Networking Consumers DFW IT Service Hard Disk Drive Motion Sickness Supercomputer Enterprise Resource Planning Halloween Google Docs Net Neutrality Refrigeration Firefox Servers Help Desk Asset Tracking Writing business network infrastructure Wearable Technology Deep Learning Personal Information Motherboard Fun IT Consultant IT Budget Mobile Scary Stories eWaste Techology Internet Exlporer Software as a Service IT Sevices Machine Learning Remote Workers Social Engineering data services Computer Repair Mail Merge Distributed Denial of Service Cleaning Notifications Vulnerabilities Environment Disaster Resistance Undo Consultation IP Address Statistics Technology Tips Software Tips Relocation Electronic Health Records IT Technicians Alt Codes Electronic Medical Records Modem Google Wallet Address Managed IT Service Webcam Crowdsourcing Geography Dark Data Troubleshooting Proactive IT Hotspot User Error Mobile Office Bluetooth Comparison Private Cloud Cyberattacks Mirgation Typing Cookies Drones Redundancy Break Fix Corporate Profile Point of Sale Cables Buisness IT Consulting Language Phone System Quick Tips Printer Migration Black Friday History Error Bookmarks Cryptocurrency Nanotechnology Knowledge Dark Web WannaCry Time Management Access Control Wires Data Breach Computing Infrastructure Chatbots Cyber Monday Cabling Favorites Staffing Bitcoin Update IoT Experience Data Warehousing Web Server Network Management SharePoint MSP Technology Laws Alerts Identity flu season Administrator Conferencing 3D Printing GPS Windows 8 Chromebook Utility Computing Lenovo Microsoft Excel VoIP Cameras Touchscreen Downloads Google Maps Law Enforcement Proactive Network Congestion iPhone Unified Threat Management Cooperation Domains 5G Shortcut Fort Worth Entrepreneur Disaster Unsupported Software CCTV Tracking Emoji Superfish Blockchain Application Digital Multi-Factor Security Gadget Remote Monitoring and Management Users Display business communications systems Staff Public Speaking Mobile Data Hacks flu shot Uninterrupted Power Supply Cost Management Permissions Spyware Google Calendar WPA3 Internet Protocol Flexibility Current Events Fort Worth IT Solid State Drive

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...