Keeping Up With User Permissions and Two Factor Authentication

Becoming aware of user permissions and two factor authentication is key to protecting against new cyber threats. Cybercriminals stay ahead of the curve in an ever evolving digital landscape. To enhance security, businesses should implement centralized solutions for access and identity of users (IAM). These can be paired with better education for users.

Typically, 2FA is implemented by having users use an authenticator software on their personal devices. This ensures that only the user’s device is used to sign in to HubSpot which reduces the risk of having stolen or lost credentials.

For instance, Duo Security, a 2FA solution that was acquired by Cisco in the year 2018, offers mobile device support for its customers. The platform of the company makes use of FIDO and Web Authentication API standards (WebAuthn) to provide mobile device authentication by making use of built-in capabilities on iOS, Android and Windows smartphones. This is a convenient method for users to verify their identity without the need of an IT professional to update apps or change settings, and it will also help to prevent users from obstructing security controls.

Other ways to implement 2FA include requiring it be enabled on certain geographic locations, using network information to verify the location of users and blocking authentication attempts from suspect networks such as Tor proxy servers, proxies or VPNs. These types of conditional policy can be implemented and enforced in various ways through the administrator dashboard of an IAM solution.

It is also crucial to be aware that the process of implementing and deploying 2FA will take time. To speed up the process, it’s recommended to use an IAM solution that lets users self-correct by disabling 2FA if their authenticator app is no longer working.

Leave a Comment

Your email address will not be published. Required fields are marked *