Keeping Up With User Permissions and Two Factor Authentication

Maintaining the user’s permissions and two-factor authentication is key to protecting from new cyber threats. Cybercriminals are always ahead the curve in a continuously changing digital landscape. To remain secure, companies should implement centralized user identity and access management (IAM) solutions that can be combined with better education for users to increase overall security.

Commonly, 2FA is implemented by requiring users to use an authenticator app on their personal devices. This ensures that only their device is used to sign into a HubSpot account, reducing the risk of stolen or lost credentials.

For example, Duo Security, a 2FA solution that was acquired by Cisco in 2018, offers mobile device support for its customers. The platform of the company uses FIDO and Web Authentication API (WebAuthn) standards to provide mobile device authentication by using built-in capabilities available in iOS, Android and Windows phones. This is an easy way for users of mobile devices to verify their identity without relying on IT professionals to update apps or alter settings. It also helps to prevent users from attempting to bypass security measures.

Other ways to implement 2FA include requiring that it be enabled on specific geographic locations, using network information click to find out more to verify the location of users and blocking authentication attempts from suspicious networks like Tor proxy servers, proxies or VPNs. These kinds of conditional policies can be set and enforced in several ways from the administrator dashboard of an IAM solution.

Additionally it is essential to recognize that the process of implementing and deploying 2FA will take time. It is a good idea to speed up the process by using an IAM solution which allows users to turn off 2FA in the event that they are no being able to use their authenticator app.

maj 28, 2024