Step up your data security with multi-factor authentication

Most often a hacker doesn’t want access to your data so they can use it for anything other than selling it on for their own financial gain. Clicking on a link in a fake email is all it takes to open the door for them to encrypt your data and block your access to it. This loss of control on your part is what’s most lucrative to them. If you want your access back, you need to pay up.
The good news is that multi-factor authentication (MFA) adds another layer of protection on top of your password/s to ensure hackers are as far removed from your data as they possibly can be.
MFA requires that you apply more than one method of authentication when you log in to access securely stored data.

There are 3 types of authentication that can work together to verify you before allowing you to log in:

  • The first type is usually a password, but it could also be a PIN or an answer to a question. Either way, it’s something private that you (and only you) should know the answer to
  • The second type is something that holds information and tends to be a material object – a phone, access swipe card or credit card are good examples
  • The third type relies on your physiology – a biometric like your fingerprint, face, voice or retina

How does MFA work?

The most common type of MFA combines the first two factors outlined above. An example is the easiest way to explain:
When you try and log in to a service or system with your email & password (the first factor), the login attempt automatically triggers the second factor – a text is sent to your mobile phone with a one-time numerical code. Enter this code when prompted on your login page, and you’ll be granted access.
This is why MFA is such a powerful way to protect your data… even if a hacker knows your username and password, it’s highly unlikely they have access to your mobile phone where the second authentication factor was sent. Without both, they can’t get access.
It’s important to note that this type of MFA needs to be an available security setting within the system or service you subscribe to. Where it’s available, you usually have the option to activate it in the settings for your account. We highly recommend you do this wherever it’s supported.
In relation to biometrics, many laptops and devices have built-in components that can scan a fingerprint or facial features before access is granted. While not as widely applied yet, we’re seeing this this type of authentication grow in popularity as product improvements evolve & users continue to upgrade their hardware.

Authenticator apps

Considered more secure, authenticator apps are a popular second factor alternative to receiving a text on your mobile device. The app produces a random numerical code. You manually ‘approve’ or type in the code and your access is granted. Some examples are Microsoft Authenticator, Google Authenticator, Authy and DuoMobile. Many banking institutions offer their own authenticator apps for their customers too.

Are you more secure with MFA?

While you will never be 100% secure, the combination of more than one authentication factor will make it much harder for someone to log in successfully with your credentials. Your account is a harder target for a hacker (they love complacency) and so they’re more likely to move on and target someone else.

The final (pass) word

The Australian Cyber Security Centre identifies MFA as one of their ‘Essential Eight’ strategies a business or individual can implement to help mitigate cyber-security incidents. We strongly recommend you visit their website where you’ll find lots of helpful information and resources for you and your business.
While MFA will go a long way to protect you, continue to regularly update your passwords too. It’s the combination of these two factors that protect you best, so make sure you don’t forget to change them every 90 days at least.
If you have any questions or would like some help establishing MFA in your team, please feel free to email us or call 1300 376 347 at any time.

Latest News

  • May 27, 2021

    Why Companies Should Invest in IT Security Services

    Companies across Australia don’t think twice about investing in things like business equipment, business premises, vehicles, staff and training. With so many businesses relying heavily on IT services and the internet to operate in the modern world, more of the investment dollar should be geared towards ensuring your IT systems are safe and secure. Investing… View Article
    Read more
  • May 18, 2021

    Benefits of Hiring IT Support for Your Business

    Many Australian organisations rely heavily on their IT systems to function. This is why managed IT support for business can prove vital in successful and ongoing operations. In this article, we’ll be taking a look at some key reasons why hiring IT support companies is a positive step for your business.   System Downtime Kills… View Article
    Read more
  • May 6, 2021

    Accelerating our next phase of growth with the appointment of EFEX’s first COO

    Today we’re please to announce that Anthony Roberts has joined EFEX as our first Chief Operating Officer (COO). Anthony has served in executive leadership roles in public and private finance companies for over 17 years. Prior to EFEX, Anthony was Managing Director at Grow Asset Finance (formerly Eclipx Commercial) a provider of fast and flexible… View Article
    Read more