<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>multi-factor authentication &#8211; Technology for Learners</title>
	<atom:link href="https://technologyforlearners.com/tag/multi-factor-authentication/feed/" rel="self" type="application/rss+xml" />
	<link>https://technologyforlearners.com</link>
	<description>Learn to use Technology and use Technology to Learn</description>
	<lastBuildDate>Wed, 16 Nov 2022 12:23:23 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://technologyforlearners.com/wp-content/uploads/2022/12/cropped-Logo-symbol-32x32.jpg</url>
	<title>multi-factor authentication &#8211; Technology for Learners</title>
	<link>https://technologyforlearners.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cisco AnyConnect VPN: Is It Worth Using Multi Factor Authentication?</title>
		<link>https://technologyforlearners.com/cisco-anyconnect-vpn-is-it-worth-using-multi-factor-authentication/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cisco-anyconnect-vpn-is-it-worth-using-multi-factor-authentication</link>
					<comments>https://technologyforlearners.com/cisco-anyconnect-vpn-is-it-worth-using-multi-factor-authentication/#respond</comments>
		
		<dc:creator><![CDATA[Will Fastiggi]]></dc:creator>
		<pubDate>Wed, 16 Nov 2022 12:23:20 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<guid isPermaLink="false">https://technologyforlearners.com/?p=5401</guid>

					<description><![CDATA[<img width="150" height="150" src="https://technologyforlearners.com/wp-content/uploads/2022/11/multi-factor-authentication-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="multi factor authentication" decoding="async" />Multi-factor authentication (MFA) is an access control system that requires two or more methods of authentication from 2 or more different categories that verify a user’s identity to log in. It is a major component to having secure network access.  The Colonial Pipeline cyber breach was a result of the lack of multi-factor authentication and [&#8230;]]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://technologyforlearners.com/wp-content/uploads/2022/11/multi-factor-authentication-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="multi factor authentication" decoding="async" />
<p>Multi-factor authentication (MFA) is an access control system that requires two or more methods of authentication from 2 or more different categories that verify a user’s identity to log in. It is a major component to having secure network access. </p>



<div style="height:26px" aria-hidden="true" class="wp-block-spacer"></div>



<p>The Colonial Pipeline cyber breach was a result of the lack of multi-factor authentication and the criminal hacking group responsible for the breach demanded a ransom of close to $5 million in exchange for their files. Because Colonial Pipeline did not have MFA in place, and relied on only a username and password, they made an easy target. Relying on just one form of authentication can lead companies to be vulnerable, which is not ideal when living in a time where ransomware attacks are becoming more frequent and sophisticated. </p>



<div style="height:26px" aria-hidden="true" class="wp-block-spacer"></div>



<p>No system is one hundred percent safe from attempted attacks, but adding <a href="https://www.logintc.com/docs/connectors/cisco-asa/" target="_blank" rel="noopener"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">Cisco Anyconnect multi-Factor authentication</mark></a> can be a major line of defense against cyber attackers. </p>



<div style="height:36px" aria-hidden="true" class="wp-block-spacer"></div>



<h2 class="wp-block-heading">What are the Benefits of Multi-Factor Authentication?</h2>



<div style="height:26px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Multi-factor authentication increases security with third parties</h3>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<p>If you’re a large corporation such as Colonial Pipeline, then third parties are likely accessing your systems for a variety of reasons. Depending on the size of your company and your systems, the amount of individuals coming in and out of your system on a daily basis could be hundreds, if not thousands, which is very difficult to keep track of. By adding another form of authentication, you&#8217;re creating an extra layer of defense. </p>



<div style="height:26px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">MFA better controls who has access to your files</h3>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Instead of using only passwords, which can be duplicated or re-used, multi-factor authentication helps an organization define who and who doesn’t have access to any sensitive or confidential information. Many companies are not assessing the <a href="https://www.forbes.com/sites/forbesbusinesscouncil/2022/10/13/best-practices-to-help-strengthen-your-companys-security-culture/?sh=328d528942ef" target="_blank" rel="noopener"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">security practices</mark></a> of third parties before granting them access while other companies haven’t even identified the third parties that can be granted access. By using two or more factors, it limits access, and can ensure that whoever is able to access data, is only the individual listed as having access. </p>



<div style="height:26px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">(H3) Multi-factor authentication offers a variety of choices to meet your security needs</h3>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Multi-factor authentication is made up of three common credentials: <em>something you know, something you have, something you are.</em> Two or more of these credentials need to be deployed for multi-factor authentication. You can customize which credentials you want your users to use so it meets the security needs of your company. Simple solutions like adaptive MFA, single sign-on, or push notifications are easy add ons to MFA. </p>



<div style="height:26px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">MFA helps meet regulatory requirements</h3>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<p>HIPAA compliance requires authorized access personnel only. Implementing measures that prevent unauthorized access, like mfa, accomplish the requirements that are required by HIPAA. Governments also have security requirements that they need to meet and implementing MFA helps them get there. This security protocol helps protect an organization while meeting external requirements. </p>



<div style="height:26px" aria-hidden="true" class="wp-block-spacer"></div>



<h3 class="wp-block-heading">Multi-factor authentication takes away password risks</h3>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Passwords have been cracked or guessed for as long as they’ve been around. Many users tend to duplicate passwords for multiple accounts, so if a hacker gets ahold of just one account password, they’ll have access to every account that uses the same passwords. A good practice is to require your users to have unique, complex passwords. An even better practice is adding MFA on top of a complex password. </p>



<div style="height:26px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Multi-factor authentication secures company data and systems by adding obstacles that keep cyber attackers out. Even if hackers have access to a password or another method of authentication, it’s rare for them to have that other authentication. Normally hackers do not have access to multiple factors of authentication. </p>



<div style="height:26px" aria-hidden="true" class="wp-block-spacer"></div>



<p>The extensive customization of multi-factor authentication options means that it is the perfect option to use in order to protect your company’s private data and speed up their digital transformation. </p>
]]></content:encoded>
					
					<wfw:commentRss>https://technologyforlearners.com/cisco-anyconnect-vpn-is-it-worth-using-multi-factor-authentication/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
