HomeCyber SecurityMulti-Factor Authentication

Multi-Factor Authentication

Multi-factor authentication can also be called two-step verification or 2-factor authentication (2FA).
Security Awareness Training

Keeping you protected

Multi-Factor Authentication services offer a second level of authentication for your web apps. After a simple username and password input, you must then either respond to a call, text, fingerprint or application notification to gain full access to your device.

Weak or stolen user credentials are used in 95% of all web application attacks. Access security has adapted to new attacks over time as passwords alone were deemed to be insecure.

Facts and figures are available at the National Cyber security Centre.

When to use 2FA?

As long as passwords are used for authentication, there will always be a chance that users and administrators will choose machine-guessable passwords and be susceptible to social engineering. Therefore:

  • Businesses should choose Cloud and Internet-connected services that offer a form of multi-factor authentication (2FA)
  • All users, including administrators, should use Multi-Factor Authentication when using Cloud and Internet-connected services
  • Businesses should consider carefully the use of services which only allow for single-factor authentication (we’d say none to that advice!)

Device Encryption is an extra consideration, which provides centralised control to protect access to email, documents, downloading and copying to name but a few benefits.

Why Penntech?

Do we provide great IT support to SMEs? Absolutely, that’s what our Clients tell us.  But why would you want to partner with us?

Other Cyber Security Services

Penntech offer the best value, technical excellence and outstanding IT help desk support and response times. That’s what our clients tell us.

What our clients say about us

We provide support and solutions to the most challenging IT problems. Read what our clients have to say about us and how we helped them.

Our Accreditations

Our Recent Case Studies

We spend our own time, not yours, to understand, source and deliver the best fit IT solutions to solve your business challenges and ensure that your business’ performance is never hampered by IT headaches. Read through the projects worked on with our clients.

Weak or stolen user credentials are used in 95% of all web application attacks.

Discuss your Multi-Factor Authentication Protection requirements with one of our experts.

Menu