What is Two Factor Authentication?

People can access email and valuable data using a broad array of devices, such as notebooks, tablet PCs and of course smart-phones, regardless of location. Two Factor Authentication, (2FA) is…

Read More...

The Future of Two Factor Authentication

2FA is not a new concept, indeed the example of ‘lock and key’ is an illustration of long this system has been available and has been in the main a…

Read More...

Why Two Factor Authentication?

More and more employees work from home or work remotely and with the development of systems that allow users to access networks regardless of location means that a few badly…

Read More...

Benefits of Two Factor Authentication

Improved Security.  A password can easily be lost or forgotten. Many people write their passwords down or use familiar details that can either be guessed or found out. The use…

Read More...

Types of Two Factor Authentication

There are a number of different types of 2FA including: Tokens This is a small device (that may, for example be attached as a key fob), which randomly generates a…

Read More...

Potential Pitfalls of Two Factor Authentication

Security.  Certain methods of 2FA can cause issues. For example, sending a one-time password or authentication code by SMS text message is not particularly secure. Mobile phones can be easily…

Read More...

Implementing a Two Factor Authentication System

Step One In the initial phase, an organisation must ask: Why are we considering a 2FA solution? What type of technology will suit my organisation? What are the risks? Do…

Read More...

Conclusion

With the burgeoning growth and use of the Internet, the increase in users needing access to networks and the demand for remote access has fundamentally changed the way that organisations…

Read More...