Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

According to Study, Only 28% Utilize Two-Factor Authentication

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.

Using data from Survey Sampling International, the researchers at Duo Labs created a survey to determine the adoption rate of 2FA. This survey was designed to mimic patterns throughout different regions to give an impression of how much 2FA was adopted, and was also targeted to a sample that was created to be proportional to the entire US population. The results of this survey provided some invaluable insights.

However, a few insights were more surprising than others. For example, only 28% used 2FA, and under half of all participants had ever heard of 2FA before taking the survey.

Yet of those who had heard of 2FA, 54% had adopted it voluntarily, and only 20.8% had first used it in their work environments. Considering the number of applications and services that encourage users to utilize 2FA as a security measure, these relatively high numbers make sense. What makes less sense is the fact that the researchers found that less than half of these voluntary adopters used 2FA at every opportunity.

Despite this, some of the survey’s results were a little more positive for the future of 2FA. Analysis of the current state of 2FA has shown a shift in how users authenticated their identities between 2010 and 2017, that shift indicating a reliance on more secure, safer methods. Hard tokens, or physical devices that a user carries to confirm their identity, have seen a decrease in use of about 50% in the time covered by this analysis. These tokens are relatively insecure, as they only need to be lost or stolen to potentially undermine the use of 2FA, so this decrease in their use shows an increase in security awareness and risk management.

Perhaps most importantly, this research provides real insights into the behavior of the user, and what they considered the most important reason to use certain 2FA methods.

Most users indicated that when they compared different approaches to 2FA, they held simplicity and convenience as their most important factors. This helps to explain why 84% of respondents ranked security tokens as the most trustworthy form of 2FA., when the security risks and issues are (as referenced above) well-known by users.

Still, the saddest truth revealed by this survey is that too few users utilize 2FA as they secure their devices, both personal and work related. Hopefully, the repeated security breaches and cyberattacks will help to change that, as the very real risk of data loss and how network security can prevent it is pushed further into the public consciousness.

The question now becomes, are your business’ resources protected by 2FA? If you want professional assistance in implementing it, and other critical security needs, give Telesys Voice and Data a call at (800) 588-4430.


No comments yet
Already Registered? Login Here
Sunday, 22 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Malware Business Computing Productivity Business Email Microsoft Internet Windows 10 Hosted Solutions Backup Ransomware Software Computer IT Services Network Security Managed Service Provider Smartphone Mobile Devices Android User Tips Google IT Support Workplace Tips Managed IT services Hardware Browser Communication Social Media Efficiency Disaster Recovery Business Continuity Outsourced IT App Innovation Data Management Smartphones Small Business Office Business Management Data Cloud Computing Holiday Upgrade Remote Monitoring Server Office 365 Windows Miscellaneous WiFi Microsoft Office Facebook Data Backup Artificial Intelligence Spam Gmail Big Data Internet of Things Network Encryption Data Recovery Firewall Apps Phishing Hosted Solution Recovery Password Robot Save Money Paperless Office Money Saving Money Remote Computing Employer-Employee Relationship Infrastructure Work/Life Balance Risk Management Tip of the week Productivity Word Passwords Hacker Chrome Cybersecurity Unified Threat Management Apple Avoiding Downtime Content Filtering Customer Service Mobile Device Management How To Office Tips Government Operating System Mobile Device SaaS Managed IT BYOD Data loss Two-factor Authentication VoIP Presentation Business Growth Settings Analytics The Internet of Things Customer Relationship Management Windows 10 Computers Outlook Telephone Systems Tech Term Document Management Vendor Management Bandwidth Data Security Education Alert Health IT Support Cybercrime Data storage Managed IT Services Computing Hacking Mobile Computing Applications IT Management Social Tech Support Website Wi-Fi Virtual Reality Antivirus Humor Project Management YouTube Unified Communications Upgrades Analyitcs Business Technology Automobile LiFi Tablet Budget End of Support Mouse Collaboration Specifications Augmented Reality Legal File Sharing IBM Running Cable Scam Twitter User Monitors Vulnerability Politics Travel Retail Bring Your Own Device Search Google Drive Automation VPN Sports Websites Identity Theft Physical Security IT service Going Green Best Practice Taxes Cortana Lithium-ion battery Business Owner Virtual Private Network Botnet Virtualization Printing Administration Server Management Samsung Marketing Safety IT solutions Licensing Storage Maintenance Wireless Technology Wireless Digital Payment Competition Computer Care HIPAA Downtime Mobile Security Information Technology communications Training Modem WannaCry Error Domains Managed IT Service Time Management 5G Hotspot Entrepreneur Environment Data Breach Mirgation Cabling Application Comparison Break Fix Users Cookies Public Speaking Network Management Web Server Language Update Printer Troubleshooting Technology Laws Migration Black Friday Dark Web Staffing 3D Printing Lenovo Nanotechnology VoIP Administrator Phone System Touchscreen Cameras Computing Infrastructure BDR Chromebook Access Control Unified Threat Management Shortcut Laptop Chatbots Disaster Law Enforcement Hard Drives Cyber Monday Network Congestion Data Warehousing GPS Unsupported Software Superfish Virtual Desktop Digital CCTV Alerts Google Maps Emoji SharePoint business communications systems Display Patch Management Halloween Identity Uninterrupted Power Supply Gadget Refrigeration flu season Microsoft Excel Tracking Mobile Data Hacks Spyware Internet Protocol Deep Learning Fun Cooperation Downloads Scary Stories Solid State Drive Fort Worth How To Blockchain Current Events Networking VoIP streamlines Heating/Cooling G Suite Staff Processors Multi-Factor Security iPhone Compliance Hard Disk Drive Undo flu shot Firefox Motion Sickness IP Address Permissions business network infrastructure Alt Codes Servers Flexibility Google Calendar Google Docs Writing Regulations Fort Worth IT Assessment Mobile Office Fraud Supercomputer Personal Information Techology data services Typing IT Consultant Operations Help Desk Legislation Social Engineering Mail Merge Buisness Social Networking Machine Learning DFW IT Service Consultation Meetings Net Neutrality IT Budget Computer Repair Disaster Resistance PowerPoint User Error Cryptocurrency Statistics Cleaning Knowledge Wearable Technology Notifications Consumers Address Motherboard Relocation Smart Technology Webcam Internet Exlporer Electronic Medical Records Google Wallet Proactive IT Bitcoin Bluetooth Experience Software Tips Crowdsourcing Software as a Service Dark Data Redundancy Router Corporate Profile Private Cloud Distributed Denial of Service Quick Tips Point of Sale Drones eWaste IT Consulting Windows 8 IT Sevices IT Technicians Technology Tips

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...