Keeping Up With User Permissions and Two Factor Authentication

Keeping up with the user’s permissions and two-factor authentication is crucial to guard against the newest cyber threats. Cybercriminals always stay ahead of the curve in a constantly changing digital landscape. To increase security, companies should implement central solutions for access and user identification (IAM). These solutions can be combined with improved education for users.

A common way of using 2FA is to require users to use an authenticator app on their personal devices. This ensures that only their device is used to sign into an account with a HubSpot account, which reduces the risk of stolen or lost credentials.

For instance, Duo Security, a 2FA solution acquired by Cisco in the year 2018, provides mobile device support for its customers. The platform is based on FIDO and Web Authentication API standards (WebAuthn) to enable mobile device authentication by accessing built-in capabilities on iOS, Android and Windows smartphones. This is a convenient method for users to verify their identity without the need of an IT professional to update apps or alter settings, and it can also prevent users from obstructing security controls.

Other methods of implementing 2FA include requiring it to be enabled on specific geographic locations, using network information to verify the location of users and blocking authentication attempts from suspicious networks like Tor, proxies and VPNs. These types of conditional rules can be imposed and set in different ways from the administrator dashboard of an IAM solution.

It is also essential to recognize surgery technology that the process of implementing and deploying 2FA will require some time. To help speed up the process, it is an ideal idea to utilize an IAM solution that lets users self-correct by removing 2FA when their authenticator app stops working.



Leave a Reply