June Cybersecurity Tip: Factor in More Than Just the Keys to the Castle

June Cybersecurity Tip: Factor in More Than Just the Keys to the Castle

img-blog-cybersecurity-cautionary-tale-V1

Nowadays, a password – no matter how formidable – just isn’t enough to protect the throne. With all the critical information we store online, Two-Factor Authentication adds an important security step to help your devices confirm that the person trying to log in is, well, you.

Find Safety in Something You Know, Something You Have, Something You Are

Passwords have become the keys to your kingdom, so you know it’s important to make them strong to prevent unauthorized access to your information. But even a strong password can be broken by a diligent cyberattacker, or the service itself might experience a breach. In either scenario, your password becomes next to useless – unless you have another layer of protection in place.

Two-Factor Authentication (2FA), a subset of Multi-Factor Authentication, requires an additional step to prove your identity. 2FA creates a more secure authentication scheme by combining two of the primary authentication methods:

  • Something you know, typically a password.
  • Something you have, usually a code generated by a smartphone or security token.
  • Something you are, often a fingerprint or other biometric.

A common method is a code generated by a smartphone app. After you enter your password, you’ll be prompted for your 2FA code from the app, which refreshes regularly. Some services send codes via SMS rather than an app, which is less secure but still better than no 2FA at all. Read More

Read more on Defendify’s blog post, Factor in More Than Just the Keys to the Castle, or learn more about RoundTable's Cybersecurity Service, Defendify by RoundTable.


Our offices will be closed on October 21st from 2-5 p.m. EST. Please contact us with any questions.Contact Us