support 1300 269 551   sales 03 9044 4767
Support portal

Why you should use two-factor authentication

two-factor authentication is very important

Hi all,


Welcome to April - the days are getting shorter, the mornings are getting colder, and the data breaches are getting more frequent. Coincidence, or something more sinister?

In any case, last month I wrote about data breaches at MyFitnessPal and MyHeritage - this month we have 8fit and Houzz - they just keep on coming! And there are many, many more. These are the ones that have affected our client base. We can’t stress enough the importance of using strong and unique passwords for all online credentials, and to enable two-factor authentication wherever possible to safeguard your accounts and identity online.

We also highly recommend that you check your own work and personal accounts using the ‘Have I Been Pwned’ website.

If you’re on a ‘Proactive’ or ‘Fully Managed’ plan with Intuitive IT, we do this automatically for your work account.

What happens when your account gets compromised and you don’t have unique passwords and two-factor authentication?

The perpetrator may have access to your email, banking, social media, and voice communications (mobile and landline) and may:

  • use your identity to exploit others
  • steal funds
  • pretend to be you and take out loans in your name
  • ransom your personal details, or sell them to others
  • just delete all your data for his/her own entertainment

We've been writing about two-factor or multi-factor authentication for a while now. In this article, we spoke about the high percentage of password reuse. If you reuse a password with the same email address, you'll find that you've put your business at risk of being hacked. With two-factor authentication, even if your credentials are exposed, the hackers can't access your services unless they have your phone or token.

That's why at Intuitive we recommend all our clients use two-factor authentication. It's the same reason we use 2FA where ever it is enabled.

If you suspect your account has been compromised, call Intuitive IT immediately and we can investigate the scope of the damage and offer assistance.

Continuing the theme of protection, we recommend and can provide backup solutions for your cloud services - just because cloud services don’t rely on servers in your office, it doesn’t mean you shouldn’t have a backup and disaster recovery strategy for them! If you’re interested in knowing more, please get in touch.


Previous Article Intuitive IT gain Dropbox Business Certified Administrators
Next Article Backups - Move it to the cloud to save your business $$$
Print

x

eBook CTA Horizontal

Free eBook: "IT and your business". Give your business the competitive edge

This eBook will highlight some key areas your business and IT need to tackle to get the most out of your technology

Fill out the form below to receive your FREE eBook
Email

CAPTCHA image
Enter the code shown above in the box below
100% Privacy.

Blog Canonical

eBook CTA

Free eBook: "IT and your business". Give your business the competitive edge

This eBook will highlight some key areas your business and IT need to tackle to get the most out of your technology

Fill out the form below to receive your FREE eBook
Email

CAPTCHA image
Enter the code shown above in the box below

100% Privacy.

Text/HTML