What You Need to Know About Multifactor AuthenticationA cyberattack could mean irreparable damage to your reputation and financial ruin for your business. Multifactor authentication can protect you.

通过Adam Levy

Opinions expressed by Entrepreneur contributors are their own.

Shutterstock

As our world grows increasingly connected, cyberattacks on businesses and institutions are becoming more common.

In May, we saw the ransomewareWannaCrywreak havoc on more than 200,000 computers across the world. ThePetya virus, meanwhile -- which has affected global brands such as Mondel?z International, advertising giant WPP and oil producer Rosneft -- has arrived as another major cybersecurity problem.

Related:The Worst Hacks of 2017 -- So Far

WannaCry工作目标通过加密的硬盘, only allowing them to recover their files after they paid a $300 ransom. Within five hours, the operators had already received 27 payments, totaling about $7,000.

The high-profile nature of these attacks -- and their increased frequency -- highlights the fact that nearly everyone who uses the internet is at risk of falling victim to cybercrime. As an entrepreneur, you need to take the proper security measures to keep your network and data safe. A cyberattack could mean irreparable damage to your reputation and financial ruin for your business.

An in-your-face offense is your best defense.

Controlling who has access to your devices and network is a big part of defending against hackers. At present, multifactor authentication (MFA) is one of the more effective tools for limiting access to the right people; it requires users to present multiple pieces of evidence rather than a simple password. It usually takes the form of two-factor authentication, which is something we're all fairly used to at this point.

Typically, the information you're required to enter can be categorized as something you know (e.g., a password or your birthday), something you have (e.g., a bank card or phone) or something you are (e.g., using a biometric marker such as your voice).

Obviously, the premise behind this type of security is that while one type of information is relatively easy for a hacker to acquire, it's far more difficult to obtain two or more types.

We're now seeing even more advancement in this arena. Swiss security researchers have reportedly found ways to eliminate inconvenience and boost reliability by usingambient noiseas an authentication token. Recording three seconds of audio from both the device attempting to log in and the user's smartphone, the service can cross-check the noise to ensure the user and the device are in the same place. Only then is access granted.

Secure your business -- and your money.

It's clear that MFA is at the crux of the future of security, and from a business perspective, the cost of implementing this security strategy far outweighs theoutrageous costof a full-on data breach. Successfully implementing it requires careful consideration of the following three steps:

1. Prioritize ease of use.It's important to remember that a security measure is only as effective as the people who use it. A University of Phoenix study found that roughly52 percentof American adults studied said they prioritize convenience over cybersecurity. If your authentication process is too big a pain, people will find ways to avoid using it when possible, and that's counterproductive.

Related:The Good, the Bad and the Careless: Insider Behaviors That Cause Data Breaches

Google has supported MFA for years, but last year, it made the authentication process for Gmail and G Suite userseven easier. In the past, signing in from a new device required manually entering a code via text message or an authenticator app. Now, users can approve login attempts by simply tapping their phone after receiving a push notification.

In contrast, anyone who's used tokens has probablyexperienced the frustrationthat ensues when you don't type in your login code fast enough -- or, worse, you lose it.

2. Vet vendors.It goes without saying that you want your security solution to be administered, well, securely. That means you need to be able to trust the vendor providing it. Yet, according to a NAVEX Global survey,32 percentof IT professionals surveyed don't take steps to assess the security initiatives of the third-party vendors they partner with. That's troubling, because these companies are just as susceptible to targeted cyberattacks as you are.

Specifically, tyou can ask prospective vendors to gauge their abilities and their fit with your needs. First and foremost, ask what kinds of security practices they take themselves: Do they have policies that take into account a wide variety of scenarios, and do they have recovery plans in place should the worst occur? If a cybersecurity provider doesn't follow best practices internally, it's probably not following them externally. So, steer clear.

Second, dig into the business's general trustworthiness and approach. Have complaints been lodged against the company? How have other customers felt about the service? Seeking references -- as well as licensing information and the Better Business Bureau's assessment of the firm -- is a great way to use others' experiences to inform your own.

3. Determine uptime.An easy-to-use and secure system goes only so far if your employees have to worry about whether they're able to access it on the job. So, reliability must be a top priority, too. According to research from theNational Cyber Security Alliance/Symantec, 66 percent of businesses surveyed reported that they depended on the internet to operate, and nearly 40 percent said they heavily depend on the internet.

That said, an unreliable MFA system could quickly paralyze those businesses -- yours too -- if employees aren't able to access the resources they need to perform their jobs. Your MFA system should guarantee a very high level of uptime --99%or better. If the vendor you have in mind can't offer this, you might need to do more shopping around.

Related:We Scored High on This Cybersecurity Quiz. How About You?

Some businesses may be required by law to have an MFA system in place because of the industry they operate in or the type of service they provide. Others may not need it at all. As a business leader, you should understand how it works, how it's evolving and whether it makes sense for your organization.

Wavy Line
Adam Levy

CEO, Magnet Solutions Group

Adam Levyis the founder ofMagnet Solutions Group,an IT and web development company, andLoTops, a CRM and management application for small businesses in any industry. He tweets regularly on business technology at@Adam__Levy.

Editor's Pick

Lock
A Majority of Workers Despise Annoying Corporate Buzzwords.So Why Do We Keep Using Them?
The Real Reason You Procrastinate andExpert Strategies to Overcoming It
Lock
Queen Latifah Says Female Leaders Must DoThese Four Things If They Want to Succeed
Lock
Want to Make Money as a Freelancer?Avoid This Mistake That Can Cost You Clients.

Related Topics

Growing a Business

Mastering Your Niche — How Specialization Leads to Better Pay and Less Competition

The path to a more rewarding, less competitive business lies in mastering your niche. Here's why.

Growing a Business

That Time Julius Caesar Was Kidnapped and Insisted His Captors Increase Their Ransom

Gee, talk about having a high opinion of yourself.

Business Models

Why Addressing the Racial Wealth Gap is Good for Business

Employers and investors have a moral imperative to make closing the racial wealth gap a focal point of their business model. There is a tremendous opportunity to hire workers from disadvantaged communities and grow and sustain a strong workforce that helps grow all businesses.

Business News

These Are the Highest Paid CEOs — And 9 Make More Than $100 Million a Year, According to a New Report

Blackstone CEO Stephen Schwarzman took the top spot from Alphabet's Sundar Pichai in total compensation in 2022.

Business News

New York City Has a Zombie Building Problem

Tenant-less office buildings are wreaking havoc on New York's commercial real estate industry.