Multi-factor authentication is one of the easiest tools to thwart a hacker, yet itโs often not implemented at small- and medium-sized manufacturers. Hereโs whatโs crucial to know:
- โItโs a best practice to stop a bad actor from accessing your account, and more powerful when partnered with a strong password,โ says Laura รlan, MxDโs senior director of cybersecurity.
โHereโs why itโs so important โ because thereโs often resistance to using strong passwords,โ รlan says. โTheyโre difficult to remember. If you write them down, you often lose them. Companies often donโt force employees to use passwords of sufficient length to be difficult to crack using common hacking methods. Consequently, if you donโt use strong passwords, multi-factor authentication is your best bet. In fact, itโs often easier for people to actually follow, because it doesnโt require them to remember anything.โ
- Two-factor or multi-factor authentication is based on the idea that your login and password are reinforced by something that you have (like your email or cell phone), something that you are (such as biometric data from your face or fingerprint), and something that you know (such as a passphrase, password, or token).
โIt has to use at least two of those things, preferably all three,โ รlan says.
- Put it on the software that is most critical, and email is the most critical.
โEmail is a treasure trove of data that bad actors can use,โ รlan says. โAlso ask yourself, what systems, if they were compromised, would disrupt your business operations? You want multi-factor authentication on any system that, if taken down, would take down your business.โ
- Put it on your companyโs Wi-Fi network access.
If a bad actor gets into a shared network, he or she, using sniffing tools, can peer into your computer and steal information, such as login information, รlan says. Make sure only the people you want to access your network access it.
Looking for additional ways to stay cybersecure? The MxD Cyber Resource Hub is a one-stop shop for cyber tools, assets, and information. And how strong is your password? Find out.