[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/multi-factor-authentication-what-it-is-and-why-its-an-integral-part-of-a-cybersecurity-protocol\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/multi-factor-authentication-what-it-is-and-why-its-an-integral-part-of-a-cybersecurity-protocol\/","headline":"Multi-factor Authentication-What it is and why it\u2019s an integral part of a Cybersecurity Protocol.","name":"Multi-factor Authentication-What it is and why it\u2019s an integral part of a Cybersecurity Protocol.","description":"Multi-factor Authentication (MFA) is a security tool that requires 2 or more pieces of evidence \u2013 or \u201cAUTHENTICATION\u201d \u2013 to prove or identify a user\u2019s identity.\u00a0 MFA has become increasingly popular throughout a variety of devices, programs, applications, transactions, and systems.\u00a0 You most likely have run into it with mobile banking or access to certain [&hellip;]","datePublished":"2021-12-07","dateModified":"2021-12-07","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/kasha-ford\/#Person","name":"Kasha Ford","url":"https:\/\/univista.com\/posts\/author\/kasha-ford\/","identifier":10,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/33eaeba24c23d4bf81db53e38627da1da0c1604cefd8066b39afba2a7b297c69?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/33eaeba24c23d4bf81db53e38627da1da0c1604cefd8066b39afba2a7b297c69?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","height":"163","width":"388"},"url":"https:\/\/univista.com\/posts\/multi-factor-authentication-what-it-is-and-why-its-an-integral-part-of-a-cybersecurity-protocol\/","about":["Uncategorized"],"wordCount":423,"articleBody":"Multi-factor Authentication (MFA) is a security tool that requires 2 or more pieces of evidence \u2013 or \u201cAUTHENTICATION\u201d \u2013 to prove or identify a user\u2019s identity.\u00a0 MFA has become increasingly popular throughout a variety of devices, programs, applications, transactions, and systems.\u00a0 You most likely have run into it with mobile banking or access to certain websites that require advanced security.\u00a0 While for some, this extra step may seem annoying, needlessly time consuming or unnecessary, it is a critical component of a company\u2019s and individuals online security.MFA requirements can be controlled based on the security level required for a particular device application, transaction, or situation.\u00a0 For high level situations, like financial transactions, a higher level of user authentication is typically preferred.\u00a0 While a less critical or lower-level situation, like logging into a gaming App, may only require a lower level of user authentication.\u00a0Traditional usernames and passcodes unfortunately can easily be compromised and are highly vulnerable to cyberattacks. It is likely that in the past one or more of an individuals or organizations passcode(s) have become compromised.\u00a0 The premise behind MFA is that, while one source of identity authentication may become compromised, the likelihood of two or more independent forms of identification becoming compromised, is significantly much lower.\u00a0 For individuals and consumers, MFA prevents unauthorized users in possession of an ill-gotten passcode and basic personal information (e.g. mother\u2019s maiden name, etc.), from accessing accounts and information. For example: blocking individuals from accessing email, social media accounts or banking information.\u00a0 For organizations, MFA helps to protect against unauthorized individuals, like former employees or cybercriminals, from accessing sensitive files.Basic forms of MFA may include requiring an answer to a predetermined security question, or identifying a phrase or an image, in conjunction with a username and passcode to logon.\u00a0 Stronger forms of MFA may require a passcode sent via an email, phone call, or text message be sent to a user with a one-time-use code to access the site, application, or information desired. Larger companies like Google and Microsoft have free applications that can manage multiple MFA accounts. In some cases, even biometrics (fingerprint or facial recognition) is utilized. Again, MFA and the level of security can be scaled up or down depending on the device, type of information, or nature of the access desired or required by an organization.If you have any questions regarding Multi-factor Authentication, please contact your UniVista Account Rep or email myteam@univista.com.Look for our upcoming Blog on Multi-factor Authentication and how it works in MS 365."},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"Multi-factor Authentication-What it is and why it\u2019s an integral part of a Cybersecurity Protocol.","item":"https:\/\/univista.com\/posts\/multi-factor-authentication-what-it-is-and-why-its-an-integral-part-of-a-cybersecurity-protocol\/#breadcrumbitem"}]}]