To protect yourself from new cyber threats, it is important to keep up with the most recent user permissions. Two-factor authentication is vital. The digital landscape is constantly changing, and cybercriminals are always one step ahead. To enhance security, businesses should adopt centralized solutions to authentication and identification of users (IAM). These solutions can be combined with improved user education.
Typically, 2FA is implemented by the requirement that users use an authenticator app on their personal devices. This ensures that only their device is used to sign into a HubSpot account, which reduces the risk of stolen or lost credentials.
Duo Security, for example, a 2FA system acquired by Cisco in 2018, provides mobile device support to its customers. The platform used by the company utilizes FIDO and Web Authentication API (WebAuthn) standards to allow mobile device authentication by using the built-in capabilities of iOS, Android and Windows phones. This provides a simple way for users to verify their identities without the need of an IT professional to update apps or change settings. It helps to stop users from obstructing security controls.
Other ways to implement 2FA is to make sure that it is activated in specific geographical locations or use network data to confirm the user’s location and block authentication attempts from suspicious networks like Tor, VPNs, and proxy servers. These conditional policies may also be created and enforced from the IAM solution’s administrator dashboard.
It is also essential to recognize that the implementation and deployment of 2FA will take time. To help speed up the process, it’s a good idea to use an IAM solution that lets users self-correct by removing 2FA if the authenticator app isn’t functioning.