Facebook and Twitter have it. Amazon, E-bay and lots of shopping sites have had it for a while. For Microsoft, Apple and Google, it’s a must! What about you?
With Cyber Crime and Internet Fraud, on the increase, Online Security has never been more important.
With Internet Fraud and Cyber Crime on the increase, standard security procedures (those only requiring a username and password) have made it easy for criminals to gain access to a user’s private data. Such low security puts your personal and financial details at risk, making identity theft and fraud a real possibility.
Two-Factor Authentication, is a way of adding an extra layer of security to your valuable data and applications. It is often known as “multi-factor authentication” as it requires not only a username and password, but also an additional level of security, such as a piece of information that only the user knows. For instance, when setting up various online accounts, you’ve probably been asked to give “the name of your first pet” or “your favourite teacher at school” – how likely is it that somebody could guess the answer? (Unless your first cat’s name was Fluffy!)
Basically, Two-Factor Authentication makes it an awful lot harder for potential intruders to gain access to any personal data.
“It’s like having in house IT…”
Dean Seddon, Speedy Products
You may have come across various types of Authentication when Online Banking, shopping, setting up email accounts or even accessing specific areas at your work place.
Becoming familiar with the different types of Two-Factor Authentication will help give you an idea of how secure your data is when using particular sites or software.
Personal Question – Something only you would know the answer to e.g. The name of your first pet, or your Mothers maiden name?
Biometrics – A fingerprint, a voice print, facial recognition and retina scanning.
Voice Call – Often used by banks, who will call your mobile number and ask you to verify a transaction by matching it with a pin showed on the screen, that can be keyed into the number pad.
Key Cards/Fobs – Can be used to gain access into certain areas, and security measures can be altered to each individual. Another example of this may be the pin-sentry used by banks – pressing a button on the fob creates a code that then must be typed onto the online banking screen.
PIN/Pattern – Most mobile phones have this form of authentication. It usually consists of a 4-digit pin that the user has created themselves, or a specific pattern they have created that can be swiped onto the screen. Pins are also used in harmony with bank cards to create Two-Factors – the card AND the pin. (Hard to use one without the other)
SMS/E-mail – You may receive an SMS or E-mail to confirm a change you have made to an account, usually followed by “if you didn’t make these changes, please contact our security team”.
"Impressed by their dedication, expertise and advice"
Since moving to them… we have been impressed by their dedication, expertise and advice to help improve the agencies fast moving environment and IT requirements across three offices. I would recommend them to any company looking to make the change to the cloud and need the detailed attention required by companies operating in a fast paced environment.Dolan Hewison, Operations and Delivery Director