Who is safe from Cyber Security Criminals?
Has anyone else noticed an uptick in cyber-security crimes lately? Banks, healthcare, social media, and others all seem to be affected. Even our government is having trouble keeping the “bad guys” off of their private networks.
Adding to the chaos is a huge part of the workforce now working remotely. So what was once primarily employees in their office environments logging directly into their secure office desktops on their secure office networks is now many random devices (laptops, phones, etc.), logging into an office network from many unexpected places. Does that sound very secure to you?
A Simple Solution- Easy to Use
So what can small and medium-size organizations do to tamp down on this security threat and keep business moving along normally, despite a new reality of network security danger from all over the world?
The best answer is quite often the simplest one. When you log into your company network every day, shouldn’t we make sure it’s REALLY YOU logging in? And if you’re at home and clearly not at the office, how can the company instantly confirm it’s you?
What if your personal mobile computer (otherwise known as a phone) can help?
It’s called dual-layer authentication. And you’re probably already familiar with it. Start with your network username and password. Through software like NetExtender, a client on your mobile devices (laptops, etc.), use your user/pass info to prompt a request on your mobile device for a secondary (or dual) authentication code. Retrieve the code from your phone, enter it into your NetExtender software on your laptop, and just like that, you have entered the company network remotely in a much more secure way.
So there you have it—an app for your organization’s network security and integration with third-party platform logins like Salesforce. Now small to medium organizations can have the same level of network security as the large corporations you do business with every day.
And at TSAChoice, we’re making dual-layer authentication an option in our Complete IT plan. Let’s keep working to keep the bad guys out of our networks!