Jackson Thornton Technologies News + Updates

Jackson Thornton Technologies has been serving the Southeast since 1999, providing IT consulting and managed services, technical helpdesk support, cybersecurity assessments, and business continuity and disaster recovery to small and medium-sized businesses.

Could MFA’s Challenges Potentially Be Fixed?

Could MFA’s Challenges Potentially Be Fixed?

User authentication is a critical security feature for a business, specifically because it helps to minimize a significant threat to your business. This is why we’re so adamant that you should require multi-factor authentication wherever it is available… but is a better way to authenticate your users on the horizon?

Let’s start by reviewing some of the drawbacks that multi-factor authentication—while exceptionally helpful—does unfortunately suffer from.

It’s Simple… Multi-Factor Authentication Can be Frustrating

For all the benefits it offers to your security, there can be no denying that MFA can be a pain, especially if there are too many steps required for your team to effectively and efficiently access their accounts, creating some friction and (as we said) frustration. Plus, the most common form of MFA (a code generated by a smartphone application) is dependent on their having the phone ready and available.

For instance, what happens when an employee is halfway to the office and they realize that their phone—and resultantly, their MFA key—is still at their house? Or maybe one of your remote workers discovers that their phone isn’t on its charging station where they left it, only to discover that their child has deposited it into the toilet…what happens then?

This is just one of the potential challenges that MFA can pose. So while the security benefits are clear, there is no denying that this security feature can also create stress.

Enter Adaptive Authentication

While still only being used by a limited (but growing) number of organizations, adaptive authentication takes other factors into account to determine whether or not an MFA prompt is called for.

Here’s how it works: let’s say that you go to work at the same time every weekday and perform more or less the same processes and tasks. Each person has their own typing patterns and ways to move the mouse, including you. These details can all be used to build a sort of profile of behaviors that your systems start to associate with each user. If something unusual happens—like a login attempt from an unfamiliar device at an odd time—an MFA prompt will be required. The idea is to strike a balance between security and convenience in such a way that neither your protections or your productivity is unduly impacted.

Various industries have started adopting this new approach, and while it may be some time before the average small or medium-sized business can easily do so, it’s something interesting to keep your eye out for.

In the meantime, Jackson Thornton Technologies can assist you with the other aspects of your business’ IT to help boost your security and productivity. Learn more by giving us a call at (877) 226-9091.

Are Your Apps Broadcasting Your Exact Location?
Tip of the Week: How to Keep MFA Fatigue from Bein...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Friday, 15 November 2024

Captcha Image

Request a Consultation

Jackson Thornton Technologies strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
Contact Us

Learn more about what Jackson Thornton Technologies can do for your business.

200 Commerce Street ,
Montgomery, Alabama 36104

Call us: (877) 226-9091

News & Updates
Jackson Thornton Technologies (JTT) is pleased to announce its expansion to a third office located in Auburn, Alabama. This new office will allow JTT to provide additional services in the East Alabama market including cybersecurity reviews, training ...