Muti-Factor Authentication Solutions from Acmetek.

Did you know 81% of data breaches caused by hackers could have been prevented with multi-factor authentication? (According to the 2017 Verizon Threat Report)

How Multi-factor Authentication Works?

How Multi-factor Authentication?

Multi-factor authentication combines two or more of the following credential types to identify a user:

  1. Something a user knows
    Examples: user name, password, challenge questions
  2. Something a user has
    Examples: hardware token, smrtcard, device
  3. Something a user is Examples: biometrics including fingerprint and retinal scan

(note: two components from the same credential type such as password and challenge questions ) (both something a user knows) does not provide more than one factor, therefore is not two factor or multi-factor authentication)

How Multi Factor Authentication Works
Security Threat Landscape

Security Threat Landscape –
Multi-Factor Authentication

Access to corporate applications and data is no longer confined to stationary workstations in offices and cubicles. The wide scale adoption of cloud and mobile has enabled a remote workforce to be more efficient and effective than ever, but created new security challenges. This additional freedom and flexibility caused a major increase in data breaches over the last several years, and resulted in a 2x uptick in stolen identities during 2016.

The mobile workforce of today wants access to corporate resources at any time, from anywhere. Security teams are tasked with securing that remote access without complicating the end user experience. With resources being accessed from a mix of corporate and non-corporate owned devices, user names and passwords can be the only security between your corporate data and hacker or potential breach.

Why Passwords are weak?

We all know passwords are inherently weak, so login policies typically enforce password expiration and complexity requirements to add security. Some experts are pushing back on resets and password complexity in part because users tend to create weaker and weaker passwords over time. Users are also more likely to keep a written list of current passwords for convenience. Not all login policies require password resets on the same date, so typical users struggle to remember what password is current for each login. Adding user friendly strong authentication will ensure that only the correct user gains access. Valid login credentials alone are not enough to login, rendering login information useless to hackers.

Why Passwords are weak

Most online users have received password reset notifications after a data breach exposed their information. Hackers can use that breached information to gain access to access all the other accounts you protect with that password, potentially creating a domino-like chain reaction. Since most hackers are using weak and/or stolen passwords to gain access to sensitive data, adding the right multi-factor authentication solution will keep hackers out, even when they have your valid login credentials.

According to recent studies:

  • Over 50% of user’s access everything online with 5 or less passwords – nearly 25% use less than 3 passwords.
  • Nearly 50% of users rely on passwords that haven’t been changed for 5 years.
  • Using the same password across multiple accounts is a dangerous security vulnerability.
    • If hacked, it can cause a “domino effect” allowing all accounts with the same password to be compromised.
    • 73% of online accounts use duplicated passwords.
  • 81% of data breaches caused by hackers in 2016 could have been prevented with multi-factor authentication.

Multi-Factor Authentication Solutions we offer:

Symantec VIP Service Authentication Managed PKI 8.X

Submit Your Quote Request!

Request a quote here to get pricing, offers and product information over the phone or through email from a Acmetek SSL Solution Specialist today!
Just complete a simple form and receive a quote in less than 24 hours!