3rd factor<\/strong> \nSomething that you are\u2014 Biometric factors such as fingerprint or FaceID<\/li>\n<\/ul>\nVery rarely, companies rely on triple authentication in addition to two-factor authentication; this is mostly only necessary for extremely critical and extra shielded areas\u2014for your admins or your finance department, for example. Of course, you are free to use biometric data already as a second factor; This can lead to high usability and user satisfaction, as this is a login variant that your employees already know from their everyday life.<\/p>\n
Preliminary considerations for introducing MFA in your company<\/h3>\n In principle, it is advisable to introduce multi-factor authentication for all employees. In this way, you also secure the computers in the area and thus enable everyone to work flexibly in the future. Even those who may still be critical of this development and prefer to work from the office. You should definitely respect this as well.<\/p>\n
<\/p>\n
You should also ask yourself what options an MFA should offer your employees<\/strong>. Common methods are so-called push messages or QR codes<\/strong> via the smartphone as well as SMS and voice codes<\/strong> via the smartphone or the telephone. However, you need to consider here: which of your employees have a business smartphone to take advantage of this offer? How many of your employees would like to continue working in the office and thus have constant access to their landline phone there? Which of your employees do not have any of these options? Might company smartphones need to be rolled out across the whole staff? As you can see, these common, basic authentication options are not necessarily feasible for 100% of your workforce. Or, if they were, they would exceed the budget.<\/p>\nFortunately, there are other secure authentication options for the second factor: hardware tokens<\/strong>. These are small pieces of hardware, about the size of a USB stick, which, once personalized, uniquely identify a user. Common formats are the so-called OTP or FIDO U2F tokens. These ensure that users who do not own any other company hardware can also log in. At the same time, they offer another cost factor that you should consider in your strategic planning.<\/p>\nIntroducing MFA\u2014how to achieve high user acceptance<\/h3>\n Like any software introduction, the introduction of an MFA requires a careful selection process as well as a successful introduction to get your employees enthusiastic about it. At first, it sounds like an unnecessary and complex process to many people, especially IT laypeople. Therefore, be sure to test the rollout with a small group to reduce potential hurdles and obstacles before performing a full-scale rollout to your company.<\/p>\n
A well-communicated and smooth roll-out will alleviate even your most critical employees\u2019 fears.<\/strong><\/p>\n <\/p>\n
Also, you can significantly increase usability, for example by defining secure networks or devices for which users do not need multiple authentications for a specified period of time. At the same time, the double security provided by MFA allows you to eliminate the need for (different) complex passwords for each application. That ensures a faster and easier log-in process to their programs. Overall, this ensures a good and stable workflow in your company. If you also choose an MFA provider that includes single sign-on functionality<\/strong> by default, users can eliminate the need to log in to different programs every day. Single login to the PC in the morning is all that is required to gain access to all relevant files and programs.<\/p>\nYou can also make life easier for your admins by allowing not just a second, but a third factor. So if someone doesn’t have their smartphone handy, but they do have their landline phone, they can identify themselves that way too. This saves lengthy log-in requests and frees up your IT for more important tasks. At the same time, your users know this from everyday life. Google or Apple, for example, already allows their customers to store various factors so that logging in is always guaranteed, even if a device is not available at the moment.<\/p>\n
Would you like to learn more about MFA, Modern Workplace, or IT Security?<\/strong><\/p>\n\ud83d\udc49 Contact us here<\/a> or leave a comment.<\/p>\n","protected":false},"excerpt":{"rendered":"Multi-factor authentication (MFA) forms the basis for strong IT security and reliable compliance processes in your company. Not only, but especially whenever you have already set up decentralized workstations and\/or want to introduce a strategy for a \ud83d\udc49 Modern Workplace concept. People at the center of your corporate philosophy The demands on the modern workplace […]<\/p>\n","protected":false},"author":1,"featured_media":12772,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[78],"tags":[],"yoast_head":"\n
Multi-factor authentication | IT Sec for Modern Workplaces | HWS Gruppe<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n \n \n \n\t \n\t \n\t \n