{"id":7910,"date":"2014-05-05T07:10:02","date_gmt":"2014-05-05T12:10:02","guid":{"rendered":"http:\/\/www.mrc-productivity.com\/blog\/?p=7910"},"modified":"2022-11-22T11:19:31","modified_gmt":"2022-11-22T17:19:31","slug":"why-modern-business-applications-need-2-factor-authentication","status":"publish","type":"post","link":"https:\/\/www.mrc-productivity.com\/blog\/2014\/05\/why-modern-business-applications-need-2-factor-authentication\/","title":{"rendered":"Why modern business applications need 2-factor authentication"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2010\/11\/Education.jpg\" alt=\"Education\" width=\"76\" height=\"100\" class=\"alignleft size-full wp-image-725\" \/><span style=\"font-size: 14px;\"><em>Summary: As these security breaches increase at alarming rates, businesses must improve their application security practices. Learn how 2-factor authentication can protect your applications against one of the most common security risks, and keep your company from a disaster.  <\/em><\/span><br \/>\n<a name=\"20140502\"><\/a><!--more--><br \/>\n2013 was a record-setting year. Just&#8230;not in a good way. <\/p>\n<p>Did you realize that <span style=\"color: red;font-weight: bold\">2013 broke the previous all-time record<\/span> for the number of exposed records caused by reported data breach incidents? The 2,164 incidents reported during 2013 exposed over 822 million records, nearly doubling the previous high mark set in 2011. <\/p>\n<p>According to a recently released 2014 Data Breach Investigations <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Outside Link', 'Data Breach Report']); \" href=\"http:\/\/www.infoworld.com\/d\/security\/5-takeaways-verizons-2014-data-breach-investigations-report-241488\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Report<\/span><\/a>, this year isn\u2019t off to a great start either. Besides the widely publicized \u201cHeartbleed\u201d bug, we\u2019re seeing a growing number of data breaches.<\/p>\n<p>The leading cause of data breaches: Stolen credentials. Hackers steal login credentials and use them to access an application or system. For businesses, the results can be devastating. Hackers can steal confidential company information, customer credit card numbers, employee data, and more. To make matters worse, the negative press generated by such an attack can often surpass the damage done by the hackers themselves.<\/p>\n<h3>How to protect your applications<\/h3>\n<p>So, how can you protect your business web applications from this threat? While I could rattle off a long list of security best practices, here\u2019s a great place to start: Implement 2-factor authentication in your sensitive web applications. <\/p>\n<p>What is 2-factor authentication? Two-factor authentication adds a second level of security to an account log-in. As illustrated below, rather than identifying users with a single factor (user name\/password), it adds a second identification factor to the login process&#8211;usually a pin number delivered via sms to the user&#8217;s mobile device. Used in popular web services (like Gmail, Twitter, Linkedin, etc&#8230;), two factor authentication is designed to maintain security, even if a user\u2019s login credentials are compromised.<\/p>\n<figure id=\"attachment_7911\" aria-describedby=\"caption-attachment-7911\" style=\"width: 525px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/05\/Two-step-verification.png\" alt=\"Two factor authentication requires two forms of identification before granting access to an account.\" width=\"525\" height=\"224\" class=\"size-full wp-image-7911\" srcset=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/05\/Two-step-verification.png 600w, https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/05\/Two-step-verification-300x128.png 300w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><figcaption id=\"caption-attachment-7911\" class=\"wp-caption-text\">Two factor authentication requires two forms of identification before granting access to an account.<\/figcaption><\/figure>\n<h3>How 2-factor authentication helps businesses<\/h3>\n<p>While businesses may not need 2-factor authentication on every single application, it&#8217;s a great way to protect sensitive business data or employee information. For example, here a couple of ways 2-factor authentication can help secure your data:<\/p>\n<ul>\n<li style=\"font-size: 14px; line-height: 1.7em;\"><strong>Require a pin number when accessing an account from a new computer<\/strong><br \/> What happens when a hacker steals one of your employee&#8217;s login credentials? Without two-factor authentication, that hacker will easily access your system. However, a web application using 2-factor authentication can be set up to require a pin number any time a login attempt is made from an unrecognized device. Delivered to the employee&#8217;s verified mobile device, the pin number ensures that attackers can&#8217;t access the system using the stolen login credentials alone. <\/li>\n<li style=\"font-size: 14px; line-height: 1.7em;\"><strong>Require a pin number for every login<\/strong><br \/>\nFor the most sensitive data, 2-factor authentication can even go a step further. For instance, companies often restrict sensitive data access to a few executives. If an internal employee (or corporate spy) steals an executive&#8217;s login credentials, sensitive corporate data could be compromised. To address this risk, applications using 2-factor authentication can be set up to require a pin number for <strong>every<\/strong> login attempt&#8211;ensuring that only the correct user can access the data.<\/li>\n<\/ul>\n<h3>Learn more<\/h3>\n<p>Of course, if you\u2019d like to learn how to build web applications with 2-factor authentication, <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Inside Link', 'm-Power']); \" href=\"https:\/\/www.mrc-productivity.com\/Products\/index.html\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">m-Power<\/span><\/a> can help. Just fill out <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Inside Link', 'Inforform']); \" href=\"https:\/\/www.mrc-productivity.com\/infoform.html\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">this form and let us know what\u2019s on your plate<\/span><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: As these security breaches increase at alarming rates, businesses must improve their application security practices. Learn how 2-factor authentication can protect your applications against one of the most common security risks, and keep your company from a disaster.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","slim_seo":{"title":"Why modern business applications need 2-factor authentication - mrc&#039;s Cup of Joe Blog","description":"Summary: As these security breaches increase at alarming rates, businesses must improve their application security practices. Learn how 2-factor authentication"},"footnotes":""},"categories":[8],"tags":[71],"class_list":["post-7910","post","type-post","status-publish","format-standard","hentry","category-education","tag-security"],"_links":{"self":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/7910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/comments?post=7910"}],"version-history":[{"count":11,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/7910\/revisions"}],"predecessor-version":[{"id":13954,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/7910\/revisions\/13954"}],"wp:attachment":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/media?parent=7910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/categories?post=7910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/tags?post=7910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}