A robust security infrastructure is based on the user’s permissions and two-factor authentication. They reduce the risk of malicious insider activity or accidental data breaches and also ensure compliance with regulatory requirements.
Two factor authentication (2FA) is a process which requires the user to enter a credential in two categories to sign in to an click to investigate account. This could include something that the user is aware of (password, PIN code, security question), something they have (one-time verification passcode that is sent to their phone or authenticator app) or something they are (fingerprint or face scan).
Often the 2FA is a subset of Multi-Factor Authentication (MFA) which is comprised of numerous more components than just two. MFA is a requirement for certain industries, such as healthcare, ecommerce, and banking (due to HIPAA regulations). The COVID-19 epidemic has added a new urgency for organizations requiring two-factor authentication for remote workers.
Enterprises are living organisms and their security infrastructures keep evolving. New access points are developed each day, roles change and hardware capabilities are constantly evolving. complex systems end up in the fingers of everyday users. It is crucial to review the two-factor authentication methods at regular intervals to ensure that they are keeping up with the latest developments. Adaptive authentication is one method to achieve this. It’s a kind of contextual authentication that triggers policies depending on the date, time and location at which the login request is received. Duo provides an administrator dashboard that allows you to easily manage and set these types of policies.
Join the conversation