Keeping Up With User Permissions and Two Factor Authentication

here are the findings

To protect yourself from new cyber threats, it is important to keep up with the most recent user permissions. Two-factor authentication is also essential. The digital landscape is constantly evolving and cybercriminals are always one step ahead. To improve security, organizations should implement central solutions for authentication and identification of users (IAM). These solutions can be combined with improved education for users.

The most common method of installing 2FA is to require that users use an authenticator app on their personal devices. This ensures that only the device of the user is used to sign in to HubSpot, reducing the risk of having stolen or lost credentials.

For example, Duo Security, a 2FA solution acquired by Cisco in 2018, provides mobile device support for its customers. The platform is based on FIDO and Web Authentication API (WebAuthn) standards to provide mobile device verification, making use of built-in capabilities on iOS, Android and Windows phones. This is a convenient way for users to verify their identities without the need for an IT professional to update apps or alter settings, and it will also help to prevent users from obstructing security controls.

Other methods to implement 2FA is to make sure that it is enabled in certain geographic areas, use network information to verify the users’ location, and block authentication attempts from a variety of suspicious networks such as Tor, VPNs, and proxy servers. These types of conditional rules can be set and enforced in various ways from the administrator dashboard of an IAM solution.

It is also important to recognize that implementing and deploying 2FA will take some time. To speed up the process, it is a good idea to use an IAM solution that lets users self-correct by removing 2FA when their authenticator app stops functioning.

Geef een reactie

Het e-mailadres wordt niet gepubliceerd. Vereiste velden zijn gemarkeerd met *