Two-Factor Authentication – IT Security Denver Experts
Preventing Data Breaches
The internet can be a cruel mistress – over the last year there have been so many viruses, spyware attacks and data breaches that many people are becoming complacent, and accepting the eventual loss of vital data as the way of the net – we just expect that in the end, there's not much we can do against a hacker that's truly dedicated. There are, however, simple things that both businesses and individuals can do that will make them much harder prey for data breachers – two-factor authentication.
“While people may claim that the attackers in these breaches are advanced, sophisticated, or state-sponsored, their actual execution is quite simple in nature,” declared Jon Oberheide, co-founder and CTO of Duo Security. “Simple phishing and other credential theft attacks have not only been the initial entry vector to these companies, but also how attackers move laterally within an organization to reach their eventual target."
Oberheide also stated that attackers will go for the easiest prey, so having a good defensive wall will ward off potential predators.
This is where two-factor authentication in. The idea is extremely simple, and extremely effective: instead of just having one method of authentication such as a password and login – which is easy game for advanced hackers – employ a second authentication that is physical, such as a USB key, or a fingerprint. Since a USB key would have to be physically stolen, and the hackers would have to employ 007-like measures to steal eye or fingerprint scans, the two-factor authentication method provides an effective way for stopping most hackers dead in their tracks.