Infracore LLC Blog

Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

Researchers at Duo Labs, using data compiled by Survey Sampling International, designed a survey that would mimic the patterns that could potentially be seen in different regions concerning the adoption rate of 2FA. The results of this survey were striking, as they revealed that only 28% of those surveyed--designed to match up to the entirety of the US population--had adopted 2FA. Over half of the participants had never even heard of 2FA before the survey was administered.

The researchers were also surprised to find that, of those who knew about 2FA, 54% were voluntary adopters, and only 20.8% had been introduced to 2FA in their work environments. However, reflecting upon the number of applications and services that now prompt users to set up some form of 2FA, this is hardly surprising. Yet despite the relatively high number of voluntary adopters, less than half of these respondents used 2FA wherever they could.

However, there were a few results that showed a bit more hope for the utilization of 2FA. First of all, an analysis of the state of 2FA that compares the authentication options in 2010 to those in 2017, shows that more people are relying on more secure methods. For instance, the use of hard tokens (or a physical device used to confirm the bearer’s identity) decreased by half in the span of time the analysis covered. This indicates an increased awareness in the potential security risks that a hard token presents--all it would take is for one of these tokens to be lost or stolen to render 2FA ineffective.

The real takeaway from the results of this research is an insight into user behavior. Namely, convenience and simplicity were important factors when a user formed an opinion of the different approaches to authentication. This helped to contribute to security tokens being ranked as the most trustworthy form of 2FA by 84% of respondents. While there was an awareness that these tokens had their issues (including the risk of losing them, as referenced above) there was still a demonstrated trust in their reliability.

Despite all this, the sad truth persists that too few people are utilizing 2FA to secure their personal and business devices. With any luck, this will change in the near future, as network security has been thrust further into the public consciousness due to the repeated breaches and attacks that have made headlines as businesses rely more heavily on computing resources.

Do you have 2FA in place to protect your business resources? For help implementing it and other crucial security measures, reach out to Infracore LLC at (858) 509-1970.

Tip of the Week: How to Type Accent Marks and Symb...
11 Ways to Enhance Android Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, January 18 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Google Business computing Network Security Microsoft Data Malware Hosted Solutions Hackers Software User Tips Innovation Backup Tech Term Internet Hardware Business Smartphones Mobile Devices Browser Business Continuity Data Backup Smartphone Email Windows 10 Android IT Services Productivity VoIP Computer Business Management Disaster Recovery Cloud Computing Small Business Outsourced IT Managed IT Services Alert Data Recovery Workplace Tips Communications Managed IT Services Chrome Artificial Intelligence Computers Router Ransomware Miscellaneous Office Communication Efficiency Network Windows 10 Law Enforcement Cybercrime Social Media Collaboration Cybersecurity How To Office 365 Password Applications Facebook Virtualization Productivity Money Windows IT Support Passwords Internet of Things Telephone Systems Holiday Server Gadgets Social Engineering Spam App Information Google Drive Automation Saving Money Quick Tips Wi-Fi Upgrade Health Word Mobile Device Work/Life Balance HaaS Keyboard Office Tips Private Cloud Vulnerability Data Protection Settings Voice over Internet Protocol IT Support Scam Data Breach Microsoft Office Two-factor Authentication Hacking Mobile Device Management Managed Service Connectivity Mobility Bring Your Own Device Phishing Save Money Data Security BDR Apps Managed Service Provider Managed IT Website CES Charger Patch Management Telephony Battery Government Windows 7 Servers Botnet Content Management Cleaning BYOD Remote Computing Paperless Office Worker Public Cloud Big Data Data Storage Business Intelligence Blockchain Flexibility Computer Care Identity Theft Machine Learning OneNote Update Legal Redundancy Infrastructure Virtual Assistant End of Support IT Management Encryption Spam Blocking Electronic Medical Records History Avoiding Downtime Automobile Samsung Bandwidth Training VPN Sports Entertainment Telephone System IT Plan Value Operating System Human Resources Data Management USB PDF Fraud Access Control Firewall Networking Software as a Service Google Docs Unsupported Software Marketing Employer-Employee Relationship Remote Monitoring Comparison HBO Amazon Authentication Instant Messaging Smart Technology Current Events Shortcuts Root Cause Analysis Virtual Reality Augmented Reality Conferencing Software Tips Telecommuting Video Games Audiobook Document Management Microchip Monitor FENG Gmail SaaS Google Apps How to Cryptocurrency Cast Specifications Outlook Amazon Web Services Nanotechnology Two Factor Authentication Knowledge Social Worker Commute Experience Remote Worker Emails Remote Work Practices Search Engine Skype Recovery Recycling Education Risk Management Wireless Internet Warranty Solid State Drive Flash Workers Addiction Black Market Hiring/Firing Safe Mode Humor Internet Exlporer Digital Signature Wiring Frequently Asked Questions Online Shopping Smart Tech Network Congestion HVAC Vendor Files Meetings Travel Music Hosted Computing Scalability Transportation Safety Bing Data storage Start Menu eWaste Computing Infrastructure Politics Rootkit Hybrid Cloud Books Assessment Wire Printer Audit Cache Employer Employee Relationship Millennials Unified Threat Management Excel Evernote Wireless IT Consultant Enterprise Content Management Display Multi-Factor Security HIPAA Wearable Technology IT solutions Physical Security Credit Cards Inventory Benefits YouTube Help Desk Tools WiFi Criminal MSP Apple Workforce Best Practice Television Mouse Computer Fan Sync Password Manager Computer Accessories Internet exploMicrosoft Mobile Computing Tip of the week Wireless Charging Devices Leadership Password Management Security Cameras Data loss Trending Information Technology Downtime Techology Users Vendor Management File Sharing iPhone Accountants Content Emergency Public Computer Smart Office Administrator The Internet of Things Business Mangement Bluetooth Advertising webinar Troubleshooting Loyalty Camera Windows 10s Windows Server 2008 Cortana Thought Leadership Search Save Time NIST Hacker Relocation User Error Screen Mirroring Staff Managing Stress Regulation Printers Twitter Smartwatch Webinar CrashOverride Thank You Company Culture Compliance Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

AngusCousens Preventing Identity Theft Should be a Priority, But Do You Know How to Handle It?
27 December 2018
What a good story you have written and I feel good reading about your story and we should share thin...
George Nivison Bring Your Own Device Is Great...When Applied Properly
21 December 2018
If you think you device get slow then try once again for the device sharing speed with the connectin...
Chantale Bass Tip of the Week: How to Use Tabs to Their Full Potential
15 December 2018
Tabs we need to use only with the ways of the potentially uses from the internet use and also for th...
JoseSClark How You Can Get Microsoft Office Certified
14 December 2018
Many users want to get Microsoft Office certified for theirselve and it was a good post for them. Re...
Donna Brock 3 Significant Ways the Cloud Can Grow Your Business
13 December 2018
In every field of life technology have a big name and now technology provide the facility to save yo...