{"id":14,"date":"2020-03-16T18:34:00","date_gmt":"2020-03-16T18:34:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=14"},"modified":"2020-09-16T15:20:49","modified_gmt":"2020-09-16T19:20:49","slug":"securing-data-with-multifactor-authentication","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/","title":{"rendered":"Securing Data with Multifactor Authentication"},"content":{"rendered":"<p>Multifactor Authentication (MFA) is the best way to secure your company\u2019s sensitive data and protect against would-be hackers. When done properly, MFA is not only a great way to secure data and your company\u2019s insider information, but it is also simple and convenient. There are two top methods which employ the best security without causing unnecessary friction.<\/p>\n<p>The first method of MFA is to use an identity provider. Three examples of identity providers are Okta, Duo and Google Authenticator. Using one of these providers, you set up your credentials via an app on your phone or some other recognized device. When you enter your credentials into your office PC, the provider you\u2019ve chosen will send you a notification on your preset recognized device. If you\u2019re the one logging in, the notification will be no surprise. You click \u201cOK\u201d on your device and you\u2019re in. If you\u2019re not the one logging in, then you\u2019ll know that you\u2019re being attacked. You can decline the notification to prevent access.<\/p>\n<p>The second method of MFA requires the use of a hardware key. Previously this method used rotating FOBs or RSA tokens that would have a code you entered on your computer. But now, hardware keys, like a Yubi Key are are USB sticks with complex cryptographic signatures. It is a physical key that you carry with you.<\/p>\n<p>A hardware key is registered with your identity provider, so when you plug it into your computer, your sign on service detects that it\u2019s plugged in to the USB. There\u2019s encryption algorithms and rotating codes built into the USB that makes it work as the second part of the MFA. But because you have the physical key, once you type in your username and password, you get right in because your credentials are recognized as part of the multifactor. So one part is your credentials, the other part of the MFA is the physical key.<\/p>\n<p>Both methods are extremely easy to implement, and you do not have to be technical to do it. A lot of the providers like Okta, Duo and Google Authenticator are built to make single sign on that is protected and simple for companies. You don\u2019t give your employees credentials for each separate system, you give them one set of credentials with multifactor authentication and from there they can access all of your needed services in a secure manner. You know they\u2019ve been authenticated and doing it this way eliminates surface area that can be attacked.<\/p>\n<p>There are many businesses which do not yet use multifactor authentication. This is largely due to misinformation and poor implementation which causes unnecessary friction. When done properly using one of the two methods discussed here, MFA is incredibly easy to use, incredibly easy to implement, and is, by far, the best way to ensure that your company\u2019s data is protected.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Multifactor authentication provides an extra layer of security for your business. Implementing it isn&#8217;t hard and is highly recommended.<\/p>\n","protected":false},"author":1,"featured_media":16,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[3,14],"tags":[15,16,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing Data with Multifactor Authentication - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Multifactor authentication provides an extra layer of security for your business. Implementing it isn&#039;t hard and is highly recommended.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Data with Multifactor Authentication\" \/>\n<meta property=\"og:description\" content=\"Multifactor authentication provides an extra layer of security for your business. Implementing it isn&#039;t hard and is highly recommended.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-16T18:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-16T19:20:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/photo-of-person-typing-on-computer-keyboard-735911-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Securing Data with Multifactor Authentication\",\"datePublished\":\"2020-03-16T18:34:00+00:00\",\"dateModified\":\"2020-09-16T19:20:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/\"},\"wordCount\":491,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/photo-of-person-typing-on-computer-keyboard-735911-scaled.jpg\",\"keywords\":[\"MFA\",\"Multifactor Authentication\",\"Security\"],\"articleSection\":[\"Cloud\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/\",\"name\":\"Securing Data with Multifactor Authentication - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/photo-of-person-typing-on-computer-keyboard-735911-scaled.jpg\",\"datePublished\":\"2020-03-16T18:34:00+00:00\",\"dateModified\":\"2020-09-16T19:20:49+00:00\",\"description\":\"Multifactor authentication provides an extra layer of security for your business. Implementing it isn't hard and is highly recommended.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/photo-of-person-typing-on-computer-keyboard-735911-scaled.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/photo-of-person-typing-on-computer-keyboard-735911-scaled.jpg\",\"width\":2560,\"height\":1709},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Data with Multifactor Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Data with Multifactor Authentication - PWV Consultants","description":"Multifactor authentication provides an extra layer of security for your business. Implementing it isn't hard and is highly recommended.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/","og_locale":"en_US","og_type":"article","og_title":"Securing Data with Multifactor Authentication","og_description":"Multifactor authentication provides an extra layer of security for your business. Implementing it isn't hard and is highly recommended.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-03-16T18:34:00+00:00","article_modified_time":"2020-09-16T19:20:49+00:00","og_image":[{"width":2560,"height":1709,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/photo-of-person-typing-on-computer-keyboard-735911-scaled.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Securing Data with Multifactor Authentication","datePublished":"2020-03-16T18:34:00+00:00","dateModified":"2020-09-16T19:20:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/"},"wordCount":491,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/photo-of-person-typing-on-computer-keyboard-735911-scaled.jpg","keywords":["MFA","Multifactor Authentication","Security"],"articleSection":["Cloud","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/","url":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/","name":"Securing Data with Multifactor Authentication - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/photo-of-person-typing-on-computer-keyboard-735911-scaled.jpg","datePublished":"2020-03-16T18:34:00+00:00","dateModified":"2020-09-16T19:20:49+00:00","description":"Multifactor authentication provides an extra layer of security for your business. Implementing it isn't hard and is highly recommended.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/photo-of-person-typing-on-computer-keyboard-735911-scaled.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/photo-of-person-typing-on-computer-keyboard-735911-scaled.jpg","width":2560,"height":1709},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing Data with Multifactor Authentication"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/14"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":5,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/14\/revisions"}],"predecessor-version":[{"id":816,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/14\/revisions\/816"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/16"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=14"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=14"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}