Male Rep1


 "Affordable, Effective, and Fast"

Have IT Questions?
Call us now (888) 894-6411


Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

Researchers at Duo Labs, using data compiled by Survey Sampling International, designed a survey that would mimic the patterns that could potentially be seen in different regions concerning the adoption rate of 2FA. The results of this survey were striking, as they revealed that only 28% of those surveyed--designed to match up to the entirety of the US population--had adopted 2FA. Over half of the participants had never even heard of 2FA before the survey was administered.

The researchers were also surprised to find that, of those who knew about 2FA, 54% were voluntary adopters, and only 20.8% had been introduced to 2FA in their work environments. However, reflecting upon the number of applications and services that now prompt users to set up some form of 2FA, this is hardly surprising. Yet despite the relatively high number of voluntary adopters, less than half of these respondents used 2FA wherever they could.

However, there were a few results that showed a bit more hope for the utilization of 2FA. First of all, an analysis of the state of 2FA that compares the authentication options in 2010 to those in 2017, shows that more people are relying on more secure methods. For instance, the use of hard tokens (or a physical device used to confirm the bearer’s identity) decreased by half in the span of time the analysis covered. This indicates an increased awareness in the potential security risks that a hard token presents--all it would take is for one of these tokens to be lost or stolen to render 2FA ineffective.

The real takeaway from the results of this research is an insight into user behavior. Namely, convenience and simplicity were important factors when a user formed an opinion of the different approaches to authentication. This helped to contribute to security tokens being ranked as the most trustworthy form of 2FA by 84% of respondents. While there was an awareness that these tokens had their issues (including the risk of losing them, as referenced above) there was still a demonstrated trust in their reliability.

Despite all this, the sad truth persists that too few people are utilizing 2FA to secure their personal and business devices. With any luck, this will change in the near future, as network security has been thrust further into the public consciousness due to the repeated breaches and attacks that have made headlines as businesses rely more heavily on computing resources.

Do you have 2FA in place to protect your business resources? For help implementing it and other crucial security measures, reach out to TWINTEL Solutions at (888) 894-6411.

Tip of the Week: How to Type Accent Marks and Symb...
11 Ways to Enhance Android Security

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Backup Hackers Network Security Malware Hosted Solutions Microsoft VoIP Google bgc roundup Software Email Mobile Devices nonprofit Disaster Recovery Managed IT Services Data Alert Business Business Continuity Outsourced IT Internet Innovation communications Windows 10 Hardware Smartphones IT Services Ransomware Tech Term Android Data Backup Saving Money Browser Cybercrime Managed IT Services Cloud Computing Server Small Business Efficiency IT Support Computer Computers Data Recovery Save Money Smartphone Business Management User Tips Productivity Internet of Things Network Windows BDR Passwords Office Mobile Device Management Quick Tips Money Telephone Systems Social Engineering Managed IT BYOD Cybersecurity IT Support Recovery Miscellaneous Gadgets Communication Hacking Virtualization Upgrade Law Enforcement Facebook Collaboration Artificial Intelligence Applications Vulnerability Productivity Mobility Social Media Phishing Work/Life Balance Holiday Bring Your Own Device Bandwidth Office 365 Remote Monitoring Two-factor Authentication Router Automation Office Tips Avoiding Downtime Managed Service Provider Flexibility Budget How To Health Firewall VPN Compliance App Proactive IT Microsoft Office Data Protection Chrome Wi-Fi Password Private Cloud Google Drive Data Breach Information Technology Windows 10 Workplace Tips History Data Security Black Market HaaS Identity Theft Operating System Business Intelligence Connectivity Value Safety Word Mobile Device Redundancy Apps Remote Computing Training Workers Marketing Emergency IT Management Big Data Document Management Computer Care Sports Infrastructure Paperless Office Comparison Patch Management Servers Legal Mobile Computing Physical Security IT Plan OneNote Save Time Update Samsung HIPAA Wireless Technology Charger Information Risk Management Scam CES YouTube Automobile End of Support Credit Cards Electronic Medical Records Data storage Encryption Worker Content Management Employer-Employee Relationship Data Management USB Windows 7 Spam Blocking Keyboard Spam Blockchain Entertainment Unsupported Software Battery Content Filtering The Internet of Things Hiring/Firing PDF Data Storage Website SaaS Government Business Owner Computing Infrastructure Cleaning Solid State Drive Files Skype Cables Human Resources Telephone System Software Tips Twitter Education Amazon Web Services Employer Employee Relationship eWaste webinar Password Management Voice over Internet Protocol Nanotechnology Techology Hacker Meetings Software as a Service Practices Public Cloud Augmented Reality Touchpad Humor Excel Remote Work Two Factor Authentication Start Menu Unified Communications Vendor Management Staff Regulation IBM Addiction NarrowBand Apple Online Shopping Computer Accessories Criminal Conferencing NIST Multi-Factor Security Assessment Smart Tech Shadow IT Books Internet Exlporer Data loss Hosted Computing Remote Worker Instant Messaging Tip of the week Password Manager IT Consultant Machine Learning Tools Theft Digital Signature Settings Going Green HBO Specifications Supercomputer Cache Users iPhone Flash Evernote Bluetooth Netflix Cryptocurrency Best Practice Content Trending Television CrashOverride Hosted Solution Screen Mirroring WiFi Inventory Audit Wiring Search Windows Server 2008 Business Mangement Leadership HVAC User Error Managed Service Politics Outlook Millennials Transportation Current Events Wireless Internet Virtual Reality Downtime Sync Wireless Charging Safe Mode Audiobook Wireless Data Warehousing Lifestyle Public Computer Devices Networking Reputation Advertising Cast Google Docs Loyalty Access Control Computer Fan How to Fraud Gmail Worker Commute Monitor Colocation Mobile Unified Threat Management Accountants MSP Hard Drives Workforce Benefits Cortana Knowledge Wire Robot Telephony Fiber-Optic Rootkit Virtual Assistant Video Games Thought Leadership Amazon Recycling Enterprise Content Management Customers Authentication FENG Troubleshooting Regulations Chromecast Professional Services Windows 10s File Sharing Scalability Experience Laptop Relocation Frequently Asked Questions Telecommuting Smart Technology Google Apps Network Congestion Smart Office nonprofits Thank You Congratulations