Keeping Up With User Permissions and Two Factor Authentication

Becoming aware of the latest user permissions and two-factor authentication is essential to protect against the latest cyber threats. Cybercriminals stay ahead of the curve in a constantly changing digital landscape. To enhance security, businesses should implement central solutions for access and user identification (IAM). These solutions can be paired with enhanced education for users.

One common method of installing 2FA is to require users to use an authenticator app on their personal devices. This ensures that only their device is used to sign into an account with a HubSpot account, reducing the possibility of theft or lost credentials.

Duo Security, for example, is a 2FA system that diagnostics and cataract surgery was acquired by Cisco in 2018, provides mobile device support for its customers. The platform of the company makes use of FIDO and Web Authentication API standards (WebAuthn) to allow mobile device authentication through using the built-in capabilities on iOS, Android and Windows smartphones. This is a convenient way for users to verify their identity without the need for an IT professional to update apps or alter settings, and it can also help prevent them from accidentally bypassing security controls.

Other methods to implement 2FA include requiring that it be enabled in certain geographic locations, using network information to verify users’ location and blocking authentication attempts from suspect networks such as Tor proxy servers, proxies or VPNs. These policies can also be crafted and enforced from the IAM solution’s administrator dashboard.

It is important to be aware that implementing and deploying 2FA will require some time. It is a good idea, to accelerate the process by using an IAM solution which allows users to disable 2FA when they are no in a position to use their authenticator application.


發佈留言必須填寫的電子郵件地址不會公開。 必填欄位標示為 *