[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-2fa\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-2fa\/","headline":"The Ping: 2FA","name":"The Ping: 2FA","description":"ShareTweet So you might have heard the buzzwords \u201c2FA\u201d or \u201cMulti-factor Authentication\u201d thrown around a lot lately. The use of 2FA has become increasingly popular over the last few years. Apple has started prompting their users to activate this more advanced form of security. Your child\u2019s Xbox Live account is now also prompting them to [&hellip;]","datePublished":"2019-03-19","dateModified":"2019-03-19","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2019\/03\/2fa.jpg","url":"https:\/\/univista.com\/wp-content\/uploads\/2019\/03\/2fa.jpg","height":640,"width":608},"url":"https:\/\/univista.com\/posts\/the-ping-2fa\/","about":["BUSINESS CONTINUITY","business management","compliance","planning","safety","Security","smart devices","The Ping","update","vulnerability"],"wordCount":606,"keywords":["2fa","compliance","disaster recovery","multi-factor authentication","o365","Security"],"articleBody":"ShareTweet                                        So you might have heard the buzzwords \u201c2FA\u201d or \u201cMulti-factor Authentication\u201d thrown around a lot lately. The use of 2FA has become increasingly popular over the last few years. Apple has started prompting their users to activate this more advanced form of security. Your child\u2019s Xbox Live account is now also prompting them to activate and use 2FA. Software you use at work, particularly credit card processing software, may also require card access or a 6 digit code. So that begs the question: what is multi-factor authentication?Multi-factor authentication is a mechanism of confirming one\u2019s identity using a combination of at least two factors or methods from the list below.Something you know (a password or an answer to a question)Something you have (a key fob or a cell phone that generates a time expired key code)Something you are (a fingerprint or an iris scan)The purpose of multi-factor authentication is to decrease the likelihood that your information can be compromised, and this authentication is becoming increasingly necessary over time. This method has several common names that all refer to the same thing. These include:2FA \u2013 \u201cTwo Factor Authentication\u201dMFA \u2013 \u201cMulti-Factor Authentication\u201dAA \u2013 \u201cAdvanced Authentication\u201d2FAHow often do you hear or see the words \u201ccreate a strong password that is not easy to guess?\u201d Probably more often than you think. Now, what happens if this extremely complicated password you have created is stored on a server that gets hacked or compromised? With two-factor authentication you may be able to prevent unauthorized access to your personal information despite someone else potentially having your password. For example, by turning on passcode text as your second form of authentication a hacker would need to physically have access to your passcode device in order to log in to your email or company software. So your next question may be \u201cwhy wouldn\u2019t I set up two-factor authentication?\u201d The most commonly reported reasons most users have for not activating some form of multifactor authentication are convenience of access and not having time to set it up. Another common reason is not knowing exactly how to do so or what 2FA actually means. That\u2019s where we come in to play. Let us help you get 2FA up and running! That might check something off your to do list, and it will improve your security once the 2FA is in use.Be preparedMulti-factor authentication does not provide a 100% guarantee that your information won\u2019t be hacked. However, properly implemented 2FA will reduce that risk and provide some peace of mind. Like disaster recovery planning you may not know what type of disaster will hit your business, but you can make sure you\u2019re prepared for it when it happens. Just enabling two-factor authentication is a good step, but to be fully prepared you need to consider the question \u201cwhat happens if I lose my phone or key fob?\u201d How do you access your data? To be prepared, make sure you know what your provider\u2019s backup contingencies are, and the steps you\u2019ll need to take to retrieve access. If you\u2019re using Office 365 through UniVista and get locked out, you can contact the help desk and we\u2019ll be happy to help you with that. If you have other data or networks that you\u2019d like to implement multi-factor authentication on, let us know. Maybe you have a compliance requirement that you need to meet? Let us help! We can work with you to pick a solution from the available options that works best for you!Your UniVista Team*Celebrating 20 Years of Customer Satisfaction*ShareTweet                                        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"The Ping: 2FA","item":"https:\/\/univista.com\/posts\/the-ping-2fa\/#breadcrumbitem"}]}]