Network Synergy Blog

According to Study, Only 28% Utilize Two-Factor Authentication

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.

Using data from Survey Sampling International, the researchers at Duo Labs created a survey to determine the adoption rate of 2FA. This survey was designed to mimic patterns throughout different regions to give an impression of how much 2FA was adopted, and was also targeted to a sample that was created to be proportional to the entire US population. The results of this survey provided some invaluable insights.

However, a few insights were more surprising than others. For example, only 28% used 2FA, and under half of all participants had ever heard of 2FA before taking the survey.

Yet of those who had heard of 2FA, 54% had adopted it voluntarily, and only 20.8% had first used it in their work environments. Considering the number of applications and services that encourage users to utilize 2FA as a security measure, these relatively high numbers make sense. What makes less sense is the fact that the researchers found that less than half of these voluntary adopters used 2FA at every opportunity.

Despite this, some of the survey’s results were a little more positive for the future of 2FA. Analysis of the current state of 2FA has shown a shift in how users authenticated their identities between 2010 and 2017, that shift indicating a reliance on more secure, safer methods. Hard tokens, or physical devices that a user carries to confirm their identity, have seen a decrease in use of about 50% in the time covered by this analysis. These tokens are relatively insecure, as they only need to be lost or stolen to potentially undermine the use of 2FA, so this decrease in their use shows an increase in security awareness and risk management.

Perhaps most importantly, this research provides real insights into the behavior of the user, and what they considered the most important reason to use certain 2FA methods.

Most users indicated that when they compared different approaches to 2FA, they held simplicity and convenience as their most important factors. This helps to explain why 84% of respondents ranked security tokens as the most trustworthy form of 2FA., when the security risks and issues are (as referenced above) well-known by users.

Still, the saddest truth revealed by this survey is that too few users utilize 2FA as they secure their devices, both personal and work related. Hopefully, the repeated security breaches and cyberattacks will help to change that, as the very real risk of data loss and how network security can prevent it is pushed further into the public consciousness.

The question now becomes, are your business’ resources protected by 2FA? If you want professional assistance in implementing it, and other critical security needs, give Network Synergy a call at 203.261.2201.

ALERT: Make Sure Your Business is Safe from Meltdo...
Where the Internet Stands in 2018
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Technology IT Support Redundancy Regulations Charger Mail Merge Current Events Deep Learning Shortcut Blockchain Multi-Factor Security CIO Value Geography Secruity Monitors IT Support Wi-Fi Cybersecurity Access Control Lenovo How To Wires WPA3 Browser Infrastructure Business Monitoring Bluetooth Wearable Technology Hosted Solution Flexibility Document Management Social Media PC Care The Internet of Things IT Solutions Office Productivity Patch Management Managed Service Data Warehousing Gadgets Storage Data Breach Debate Competition Leadership Private Cloud Processors IT Management IT Technicians Web Server Downloads Employer-Employee Relationship Features Encryption Scary Stories Budget Identity Webinar Migration CrashOverride Troubleshooting High-Speed Internet IT service Tracking Utility Computing Cloud Operations Printer Going Green Printers CCTV Management YouTube Domains Outlook Distributed Denial of Service Hotspot Virtual Private Network Artificial Intelligence Documents Scheduling Webcam Computers Black Friday Business Growth Data Security Tip of the Week User Error Business Intelligence Backup Humor VoIP Permissions Staff Mobile Office Hard Drives Electronic Health Records Public Speaking BDR Licensing Point of Sale Intranet Alt Codes Application Microsoft Phishing Apps Supercomputer Proactive IT IP Address Websites Android G Suite 3D Printing Inbound Marketing Spyware Streaming Media Hiring/Firing Microsoft Excel Memory Computer Repair LinkedIn USB Disaster Hackers Backups Error IT budget 3D VPN Nanotechnology Law Enforcement Managing Stress Automobile Business Technology Comparison Data Management Alerts Managed IT services Work/Life Balance eBay Office 365 Specifications Thank You WiFi Net Neutrality Motion sickness Physical Security Recovery Cache Text Messaging Unified Communications IBM Server Disaster Recovery Print Server Computer Accessories Experience Cooperation Data Backup Compliance Mirgation Printing PDF Information Technology Service-based Business Smartphone Remote Workers SharePoint Software as a Service Quick Tips Assessment Notifications Tip of the Work Halloween Law Firm IT Hard Disk Drive Files GPS Software Tips Recycling Enterprise Resource Planning Fax Server Public Cloud Relocation App Modem Best Available Remote Monitoring and Management Tablet Administration Firewall Augmented Reality MSP Knowledge Computing Infrastructure Malware Saving Time Tutorials Security Cables Healthcare Conferencing Wireless Technology Alert Automation Battery Employee-Employer Relationship Typing Office Tips Settings Save Money Staffing Avoiding Downtime LiFi Spam Dark Web Servers Enterprise Content Management Google Analytics Windows 8.1 Update Break Fix Skype Mouse Content Filtering Google Docs IT Consultant Hosted Solutions Remote Computing Unified Threat Management People Online Currency Users Co-managed IT Data storage Sports Windows 10 Privacy Programming Phone System Windows 8 Trainging Hardware Machine Learning Email Word History Heating/Cooling Development Emoji Crowdfunding Communication Administrator Proactive Managed IT Big Data Mobile Device Management Social Networking Government Crowdsourcing Project Management Cameras Digital Signature Information Logs Downtime Cyberattacks Google Wallet Language Tech Support Marketing Favorites Customer Relationship Management Gmail Collaboration Time Management Small Business Scam OneNote Mobile Device Cortana E-Commerce Display Congratulations Cyber Monday IT Consulting Fraud Upgrades Bitcoin Social Engineering Superfish Windows Chatbots Hard Drive Motherboard Uninterrupted Power Supply Digital Telephone Systems Fun Legal Business Continuity Business Management Risk Management Software Health Solid State Drive Tip of the week Politics Cleaning Computer Presentation File Sharing Video Surveillance IT Services Running Cable Business Owner communications Ransomware Retail Smart Tech Technology Tips Black Market Refrigeration Managed Services Provider Cookies Buisness User Tips Legislation Managed IT Services Cabling Website Personal Information Techology Network Management Unsupported Software Analyitcs Address Customer Service Gaming Console Antivirus Mobile Computing Cybercrime Food Workplace Tips Bandwidth Education Money Internet Exlporer Identities Company Culture Disaster Resistance Holiday Drones User Data Loss Virtual Desktop Touchscreen Macro Smartphones Training Saving Money Mobility Piracy Electronic Medical Records Network Congestion Consulting Computer Care Chromebook Fleet Tracking Social PowerPoint Remote Support Bring Your Own Device Google Maps Taxes Botnet Apple Regulation Firefox Internet Innovation Google Drive Computing Networking End of Support Paperless Office Cost Management Remote Monitoring Excel Digital Payment Corporate Profile Business Computing Best Practices Smart Technology Virus Efficiency Virtual Reality Maintenance Microsoft Office Unified Threat Management Internet of Things Virtualization Twitter Safety Tech Term Mobile Data Finance Operating System IoT Work Station iPhone Asset Tracking Server Management Password BYOD Writing Read Only Router SaaS Robot Applications Google Sync Technology Laws Best Practice Upgrade Bookmarks Help Desk Undo Managed Service Provider Consumers Laptop Cryptocurrency Travel Samsung Entrepreneur Statistics How To Connectivity Lithium-ion Battery Trending Two-factor Authentication Facebook Hacks Search Google Calendar Mobile Wireless Consultation Hacking Mobile Technology HIPAA Star Wars eWaste Start Menu Gadget Data Screen Reader 5G Mobile Security Network Telephony Windows 10 Mobile Devices Miscellaneous Cloud Computing Data Recovery Passwords Vendor Management Identity Theft Network Security Save Time Vulnerabilities Hacker Outsourced IT Instant Messaging Environment Chrome Managed IT Service Meetings Vulnerability Productivity

      Latest Blogs

      The cloud is such an important part of today’s business environment that most organizations use it to some extent, even if it’s just for basic storage needs. However, the cloud nee...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube