Keeping Up With User Permissions and Two Factor Authentication

To protect against new cyber-attacks, it’s important to keep up with the most current user permissions. Two-factor authentication is essential. The digital landscape is constantly changing and cybercriminals remain one step ahead. To be secure, businesses need to deploy centralized user identity and access management (IAM) solutions that can be used in conjunction with better education for users to increase overall security.

A common way of using 2FA is to require users to use an authenticator application on their personal devices. This will ensure that only the device of the user is used to sign in to HubSpot, reducing the risk associated with stolen or lost credentials.

For instance, Duo Security, a 2FA solution acquired by Cisco in the year 2018, offers mobile device support to its customers. The company’s platform uses FIDO and Web Authentication API (WebAuthn) standards to enable mobile device verification by using built-in capabilities available in iOS, Android and Windows phones. This provides a simple way for users to verify their identities without the need for an IT professional to update their apps or change settings, and it can also prevent users from obstructing security controls.

Other methods to implement 2FA are to insist that it is enabled in specific geographic locations and then use the network’s information to verify the user’s location, and block authentication attempts from a variety of suspicious networks such as Tor, VPNs, and proxies. These conditional policies can also be created and enforced via the IAM solution’s administrator dashboard.

It is also crucial to realize that implementing and deploying 2FA will take some time. To help speed up the process, it is recommended to use an IAM solution that lets users self-correct by removing 2FA when their authenticator app is no longer working.

article

Leave a comment

0
    0
    Carrito

    Obtén una cotización