Keeping Up With User Permissions and Two Factor Authentication

To safeguard against new cyber threats, it is crucial to keep up-to-date with the latest user permissions. Two-factor authentication is also crucial. Cybercriminals are always ahead the curve in a continuously changing digital landscape. To remain secure, companies must implement central user identity and access management (IAM) solutions which can be combined with better education for users to increase overall security.

Commonly, 2FA is implemented by requiring users to utilize an authenticator application on their personal devices. This ensures that only the user’s device is used to log in to HubSpot thus reducing the risk of having stolen or lost credentials.

Duo Security, for example, is a 2FA system that was purchased by Cisco in the year 2018 offers mobile device support to its customers. The platform of the company uses FIDO and Web Authentication API (WebAuthn) standards to allow mobile device verification through making use of built-in capabilities on iOS, Android and Windows phones. It is a simple method for users of mobile devices to verify their identity without having to rely on IT experts to update apps or make changes to settings. It can also prevent users from accidentally ignoring security measures.

Other ways to implement 2FA include requiring it to be enabled on specific geographical locations, using network information to verify users’ location and blocking authentication attempts from suspect networks like Tor proxy servers, proxies or VPNs. These conditional policies can also be created and enforced via the IAM solution’s administrator dashboard.

It is important to be aware that implementing and deploying 2FA will require some time. It is a good idea, to accelerate the process by using an IAM solution that allows users to disable 2FA if they aren’t in a position to use their authenticator application.

Leave a Reply

Your email address will not be published. Required fields are marked *