5 Reasons You Need To Consider Multi-factor Authentication.

Moving to the cloud has transformed the way we work today - no longer are we restricted to a specific location to complete our day-to-day duties. However, it also means that your organisation is more vulnerable to malicious activities such as key-logging, phishing or password theft

Traditionally, organisations have relied on security policies (for example, maximum password age, and required complexity). However, if these are the only safeguards, once a password compromised, an attacker has unrestricted access to an account, and by extension, everything that account has access to. .

Adding another form of authentication, such as multi-factor authentication, makes it significantly harder for an attacker to gain access in the first place. Here are 5 reasons you should consider adding multi-factor authentication to your business systems.


Preventing authorised access

Unfortunately for business owners, as long as your business continues to turn over money, cybercriminals will want to gain access to your system.

Having your organisation’s accounts and data protected by another layer of security means that cybercriminals have to hack not only the password itself, but the second form of protection as well. This increases the difficulty of doing so exponentially.

Peace of mind 

Typically, your end users will be just as worried as you are about their account being compromised.

Since the early 2000’s, cybercrime has been growing year on year, with phishing attempts, hacking, and other sophisticated attacks now being commonplace. Employees have to (or, should be!) question(ing) every email, link, and any odd behaviour that they see – certificate warnings on websites, for example.

Being notified – such as by a text, call, or alert via an app on a smartphone - every time an account is attempted to be accessed is a great way to ensure only legitimate access is permitted (and possible).

Conditional Access 

As the workplace has evolved, bring your own device (BYOD) has become a popular option for a lot of community, nonprofit and SME organisations. BYOD could be anything from a phone, a USB drive or even a laptop.  However, if these devices are connected to your network without robust AV, a secure password or out of date software they can be a very real security risk.

MFA Conditional access means that you can define conditions that will not allow a device to access  your network unless it is  compliant with  minimum security requirements. 

Additionally, it may be worth considering configuring  location access. This means that if someone tries to access your account in another country you can block that access right away, keeping your environment safe from unauthorized access from foreign locations.

Compliance 

Australia’s new data breach law has meant that everyone is accountable for their data, and any company that isn’t may risk a fine.

According to Sophos, 1 in 4 individuals will experience a data breach, and for this reason, many organistions are adopting security standards such as the Information Security Registered Assessors Program (IRAP), which is governed and administered by the Australian Signals Directorate (ASD).

IRAP aims to to maximise the security of Australian businesses by focusing on the ICT infrastructure that stores, processes, and communicates it.

All organisations that undergo IRAP certification need to have MFA configured to ensure their data is secure.

Integrate biometrics

Your authentication should be made up of 3 things: 

Something you know – A password or a pin number for an account. 

Something you have – A device like a mobile phone or a piece of software that can generate a one-time token. 

Something you are – A feature only you can have, such as a fingerprint, a voice command or even your face. 

Biometrics such as fingerprints or face recognition are great additions to add to your multifactor authentication.   

Along with a password, this can make any account very difficult to compromise. Not only would an attacker need to compromise the account's password, but they would also need to gain access to the individual's device and / or identity to access the account.

Some vendors, such as duo, already incorporate this technology in their solutions, and can require that when a user logs into their account, they need to successfully validate their fingerprint on their phone to gain access.

Multi-factor authentication is something every business should consider..  There are a range of solutions  available, so it is worth taking time to research what will suit your business (and users) best. Or, of course, work with us at Evolve IT to help you determine the best choice.

Preparing Organisations For Australia’s Data Breach Law


HOW EVOLVE IT CAN HELP?

We take great pride in partnering with organisations. Our team specialises in developing customised solutions to help you get the most out of your technology.

Posted by Lachie Dixon

Find me on:

Subscribe to our blog