Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

According to Study, Only 28% Utilize Two-Factor Authentication

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.

Using data from Survey Sampling International, the researchers at Duo Labs created a survey to determine the adoption rate of 2FA. This survey was designed to mimic patterns throughout different regions to give an impression of how much 2FA was adopted, and was also targeted to a sample that was created to be proportional to the entire US population. The results of this survey provided some invaluable insights.

However, a few insights were more surprising than others. For example, only 28% used 2FA, and under half of all participants had ever heard of 2FA before taking the survey.

Yet of those who had heard of 2FA, 54% had adopted it voluntarily, and only 20.8% had first used it in their work environments. Considering the number of applications and services that encourage users to utilize 2FA as a security measure, these relatively high numbers make sense. What makes less sense is the fact that the researchers found that less than half of these voluntary adopters used 2FA at every opportunity.

Despite this, some of the survey’s results were a little more positive for the future of 2FA. Analysis of the current state of 2FA has shown a shift in how users authenticated their identities between 2010 and 2017, that shift indicating a reliance on more secure, safer methods. Hard tokens, or physical devices that a user carries to confirm their identity, have seen a decrease in use of about 50% in the time covered by this analysis. These tokens are relatively insecure, as they only need to be lost or stolen to potentially undermine the use of 2FA, so this decrease in their use shows an increase in security awareness and risk management.

Perhaps most importantly, this research provides real insights into the behavior of the user, and what they considered the most important reason to use certain 2FA methods.

Most users indicated that when they compared different approaches to 2FA, they held simplicity and convenience as their most important factors. This helps to explain why 84% of respondents ranked security tokens as the most trustworthy form of 2FA., when the security risks and issues are (as referenced above) well-known by users.

Still, the saddest truth revealed by this survey is that too few users utilize 2FA as they secure their devices, both personal and work related. Hopefully, the repeated security breaches and cyberattacks will help to change that, as the very real risk of data loss and how network security can prevent it is pushed further into the public consciousness.

The question now becomes, are your business’ resources protected by 2FA? If you want professional assistance in implementing it, and other critical security needs, give Telesys Voice and Data a call at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 18 July 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Malware Privacy Business Computing Productivity Business Email Microsoft Internet Hosted Solutions Windows 10 Software Backup Managed Service Provider Ransomware Computer IT Services Mobile Devices Network Security Android Smartphone Managed IT services User Tips Workplace Tips Social Media Google IT Support Outsourced IT Hardware Browser Communication Disaster Recovery Business Continuity Efficiency Data Management Data Backup App Smartphones Innovation Holiday Small Business Office Business Management Upgrade Data Cloud Computing Microsoft Office Internet of Things Facebook Data Recovery Remote Monitoring Server Office 365 Miscellaneous WiFi Windows Gmail Big Data Network Encryption Spam Artificial Intelligence Bandwidth Firewall Productivity Apps Phishing Password Hosted Solution Recovery Robot Save Money Paperless Office Managed IT Services Hacker Work/Life Balance Apple Avoiding Downtime Content Filtering Customer Service Mobile Device Management Infrastructure Saving Money Office Tips Unified Threat Management Remote Computing Tech Term Employer-Employee Relationship Tip of the week Customer Relationship Management Risk Management Document Management How To Government Passwords Cybersecurity Chrome Money Word Health Education IT Management Hacking Cybercrime Mobile Computing File Sharing Tech Support Antivirus Mobile Device Vendor Management Managed IT Social Data loss Operating System Website Alert Wi-Fi BDR Data storage VoIP Presentation Business Growth Windows 10 Computing Two-factor Authentication Compliance Settings Telephone Systems Outlook Analytics Virtual Reality The Internet of Things Computers Data Security SaaS IT Support BYOD Applications Best Practice Server Management Smart Technology Budget Lithium-ion battery End of Support Search Business Owner HIPAA Bring Your Own Device Sports Licensing Mouse IT service Mobile Security Maintenance Cortana Collaboration Digital Payment Marketing Virtualization Legal Administration Twitter Competition Politics Monitors Project Management IT solutions Safety Travel Google Drive Information Technology Wireless Technology Websites Automation Business Technology Wireless Tablet Physical Security Humor Going Green Downtime Taxes Botnet communications Analyitcs Printing YouTube Samsung Unified Communications Storage Patch Management Scam LiFi Specifications Vulnerability Computer Care Regulations User VPN Training Augmented Reality Identity Theft Running Cable Retail Virtual Private Network IBM Assessment Automobile Upgrades data services Motherboard Scary Stories Web Server Help Desk Update Mobile Mail Merge Internet Exlporer Consultation Software as a Service Administrator IT Budget 3D Printing Disaster Resistance User Error Router Statistics Distributed Denial of Service Cameras Undo Chromebook Network Congestion Vulnerabilities Address IP Address Law Enforcement Technology Tips Unsupported Software Proactive IT IT Technicians Alt Codes PowerPoint Modem Bluetooth Managed IT Service CCTV Software Tips Emoji Gadget Display Geography Redundancy Hotspot Corporate Profile Mobile Office Quick Tips Comparison Mobile Data Consumers Hacks IT Consulting Mirgation Typing Cookies Break Fix Buisness Cables Language WannaCry Printer Time Management Black Friday Knowledge Current Events Data Breach Migration Cryptocurrency Nanotechnology Dark Web G Suite Cabling Processors eWaste Wires IT Sevices Computing Infrastructure Access Control Network Management Cyber Monday Experience Motion Sickness Technology Laws Chatbots Bitcoin Google Docs IoT Data Warehousing Environment Staffing Writing Lenovo Alerts VoIP SharePoint Touchscreen flu season Personal Information Unified Threat Management Identity Windows 8 Utility Computing Shortcut Microsoft Excel IT Consultant Disaster Domains Troubleshooting Machine Learning GPS Entrepreneur Social Engineering Superfish Cooperation Digital Downloads 5G Fort Worth Meetings Google Maps Application Computer Repair business communications systems Phone System Healthcare Blockchain Users Cleaning Uninterrupted Power Supply Public Speaking Notifications Relocation Tracking Staff Spyware Multi-Factor Security flu shot Webcam Electronic Medical Records Google Wallet Internet Protocol Dark Data Cost Management Permissions Solid State Drive Crowdsourcing Google Calendar Private Cloud Networking Flexibility How To Heating/Cooling Fort Worth IT Laptop Point of Sale Hard Drives Drones VoIP streamlines Management Fraud Virtual Desktop Hard Disk Drive Legislation Error Operations Firefox business network infrastructure Social Networking Servers DFW IT Service Halloween Refrigeration iPhone Enterprise Resource Planning Net Neutrality Fun Supercomputer Techology Wearable Technology Deep Learning

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code