What You Need to Know About Multifactor AuthenticationA cyberattack could mean irreparable damage to your reputation and financial ruin for your business. Multifactor authentication can protect you.

ByAdam Levy

Opinions expressed by Entrepreneur contributors are their own.

Shutterstock

As our world grows increasingly connected, cyberattacks on businesses and institutions are becoming more common.

In May, we saw the ransomewareWannaCrywreak havoc on more than 200,000 computers across the world. ThePetya virus, meanwhile -- which has affected global brands such as Mondel?z International, advertising giant WPP and oil producer Rosneft -- has arrived as another major cybersecurity problem.

Related:The Worst Hacks of 2017 -- So Far

WannaCry工作目标通过加密的硬盘, only allowing them to recover their files after they paid a $300 ransom. Within five hours, the operators had already received 27 payments, totaling about $7,000.

The high-profile nature of these attacks -- and their increased frequency -- highlights the fact that nearly everyone who uses the internet is at risk of falling victim to cybercrime. As an entrepreneur, you need to take the proper security measures to keep your network and data safe. A cyberattack could mean irreparable damage to your reputation and financial ruin for your business.

An in-your-face offense is your best defense.

控制谁有权访问您的设备和网络work is a big part of defending against hackers. At present, multifactor authentication (MFA) is one of the more effective tools for limiting access to the right people; it requires users to present multiple pieces of evidence rather than a simple password. It usually takes the form of two-factor authentication, which is something we're all fairly used to at this point.

Typically, the information you're required to enter can be categorized as something you know (e.g., a password or your birthday), something you have (e.g., a bank card or phone) or something you are (e.g., using a biometric marker such as your voice).

Obviously, the premise behind this type of security is that while one type of information is relatively easy for a hacker to acquire, it's far more difficult to obtain two or more types.

We're now seeing even more advancement in this arena. Swiss security researchers have reportedly found ways to eliminate inconvenience and boost reliability by usingambient noiseas an authentication token. Recording three seconds of audio from both the device attempting to log in and the user's smartphone, the service can cross-check the noise to ensure the user and the device are in the same place. Only then is access granted.

Secure your business -- and your money.

It's clear that MFA is at the crux of the future of security, and from a business perspective, the cost of implementing this security strategy far outweighs theoutrageous costof a full-on data breach. Successfully implementing it requires careful consideration of the following three steps:

1. Prioritize ease of use.It's important to remember that a security measure is only as effective as the people who use it. A University of Phoenix study found that roughly52 percentof American adults studied said they prioritize convenience over cybersecurity. If your authentication process is too big a pain, people will find ways to avoid using it when possible, and that's counterproductive.

Related:The Good, the Bad and the Careless: Insider Behaviors That Cause Data Breaches

Google has supported MFA for years, but last year, it made the authentication process for Gmail and G Suite userseven easier. In the past, signing in from a new device required manually entering a code via text message or an authenticator app. Now, users can approve login attempts by simply tapping their phone after receiving a push notification.

In contrast, anyone who's used tokens has probablyexperienced the frustrationthat ensues when you don't type in your login code fast enough -- or, worse, you lose it.

2. Vet vendors.It goes without saying that you want your security solution to be administered, well, securely. That means you need to be able to trust the vendor providing it. Yet, according to a NAVEX Global survey,32 percentof IT professionals surveyed don't take steps to assess the security initiatives of the third-party vendors they partner with. That's troubling, because these companies are just as susceptible to targeted cyberattacks as you are.

Specifically, tyou can ask prospective vendors to gauge their abilities and their fit with your needs. First and foremost, ask what kinds of security practices they take themselves: Do they have policies that take into account a wide variety of scenarios, and do they have recovery plans in place should the worst occur? If a cybersecurity provider doesn't follow best practices internally, it's probably not following them externally. So, steer clear.

Second, dig into the business's general trustworthiness and approach. Have complaints been lodged against the company? How have other customers felt about the service? Seeking references -- as well as licensing information and the Better Business Bureau's assessment of the firm -- is a great way to use others' experiences to inform your own.

3. Determine uptime.An easy-to-use and secure system goes only so far if your employees have to worry about whether they're able to access it on the job. So, reliability must be a top priority, too. According to research from theNational Cyber Security Alliance/Symantec, 66 percent of businesses surveyed reported that they depended on the internet to operate, and nearly 40 percent said they heavily depend on the internet.

That said, an unreliable MFA system could quickly paralyze those businesses -- yours too -- if employees aren't able to access the resources they need to perform their jobs. Your MFA system should guarantee a very high level of uptime --99年每centor better. If the vendor you have in mind can't offer this, you might need to do more shopping around.

Related:We Scored High on This Cybersecurity Quiz. How About You?

Some businesses may be required by law to have an MFA system in place because of the industry they operate in or the type of service they provide. Others may not need it at all. As a business leader, you should understand how it works, how it's evolving and whether it makes sense for your organization.

Wavy Line
Adam Levy

CEO, Magnet Solutions Group

Adam Levyis the founder ofMagnet Solutions Group,an IT and web development company, andLoTops, a CRM and management application for small businesses in any industry. He tweets regularly on business technology at@Adam__Levy.

Editor's Pick

We're Now Finding Out TheDamaging Results of The Mandated Return to Office— And It's Worse Than We Thought.
He 'Grew Up in Bars' and Was Drinking By Age 10 — But Entrepreneurs Changed His Life. Now a Business Owner Himself,He's Paying It Forward.
LinkedIn Changed Its Algorithms — Here's How YourPosts Will Get More Attention Now
'Focus Is Just as Important as Passion': How to Avoid狗万官方企业家精神缺失症in Franchising
Lock
Kevin O'Leary Recommends This6-Step Strategyfor Making Money on Social Media
Lock
ThisMindset Shift Changed My Life— And Gave Me the Courage to Leave My Well-Paid Full-Time Job.

Related Topics

Growing a Business

Why Lifelong Learning Is the Key to Entrepreneurial Success — and How to Embrace the Lifelong Learner Within Yourself

Let's discuss the power of lifelong learning and a few habits you must cultivate to embrace the lifelong learner within yourself.

Marketing

Brand Loyalty Isn't Enough to Keep Customers — But Reviews and Rewards Are. Here's How.

Reviews and rewards are the biggest factors swaying consumers in the new digital landscape. Brands need to get with the program.

Starting a Business

Using a Severance Package to Launch Your Own Business? Here's What You Need to Know.

With layoffs at a record high, many are taking their severance packages and investing them into starting a business for themselves.

领导

领导Qualities the Most Successful Small Business Owners Share

While every entrepreneur has a unique journey, there are certain qualities that the most successful small business owners have.

Growing a Business

5 Intangible Qualities That Hold the Key to Unparalleled Business Success

There are a lot of practical and tangible aspects of business success. But some of the most critical components are often intangible.

Living

17 Inspirational Quotes from Oscar-Winning Movies

To get excited for the Academy Awards, here are some of the best quotes from Hollywood's top films.