(415) 246-0101

Microtechs Blog

Intro to Your Tech: Authentication

Intro to Your Tech: Authentication

Authentication is something that even the everyday user of a computer might encounter in different ways. Take, for example, identity authentication. You can use a driver’s license, library card, or even a PIN number. Computers use authentication as a part of their main primary functionality, and it mostly comes in the form of passwords and usernames. We’ll take a closer look into what authentication is and what it does.

Authentication vs Authorization
Authentication is basically the act of saying “Yes, I am who I say I am.” While the two are often considered the same, they are slightly different. Authorization is more along the lines of confirming an identity to access information or materials. In fact, the act of authorization cannot actually occur without authentication happening.

How Authentication Works
A user will provide their credentials, which are then cross-referenced with the credentials that the system has stored in a database. If the credentials match, the user is granted authorization to access the system. Depending on the identity associated with these credentials, authorization can be granted at a variety of levels. For example, management will often have more privileges within their network due to the role they play within an organization.

Two-Factor Authentication
In an effort to improve security, many organizations have turned to a method called two-factor authentication, or 2FA for short. 2FA adds an extra layer of security to accounts that would ordinarily only need a username or password. This code is typically delivered to the user via email, application, or a text message whenever they try to access an account protected by 2FA. The code is one-time, so it will always change upon further login attempts. This creates a situation where accounts can only be accessed if the user has access to the other account associated with the 2FA settings defined by the user, securing them from hackers who don’t have access to both. This is the reason why 2FA is so widely used in the business world.

If your business could use a secondary layer of security (hint: it can!), Microtechs can help. To learn more, reach out to us at (415) 246-0101.

A Short Look at 2018 in Cybersecurity
Which Hosted Solution Are You Depending On?

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, January 16 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security User Tips Tech Term Privacy Productivity Smartphones Internet Efficiency Malware Cybersecurity Hardware Mobile Device Microsoft Android Browser Cloud Communication Data Email Passwords Wi-Fi Ransomware Google Network Small Business IT Support Users Data recovery Managed IT services Communications Business Management Applications Collaboration Backup Data Backup Windows 10 Software IT Services Wireless Hosted Solutions Holiday Mobile Devices Internet of Things Saving Money Managed IT Services Employer-Employee Relationship Smartphone Workplace Tips Hackers Networking Innovation Social Media Business Intelligence Blockchain Information Marketing Cloud Computing Business Outsourced IT VoIp Microsoft Office Phishing Managed IT Service Connectivity Password Artificial Intelligence Government Wireless Charging Router Excel Analytics Apps Computer Virtual Assistant Virtualization Data Breach Managed Service Patch Management Data Protection VPN Cortana Data Management Cost Management Gmail Miscellaneous Compliance Bandwidth Tech Terms Computers Remote Computing Remote Monitoring and Management Access Control Save Money BDR Automation Spam Tactics File Sharing Mobility eCommerce Physical Security Hard Drives A.I. Microsoft Teams Authentication Hard Drive Wireless Internet Tablet Error Lead Generation disposal Paperless Office Safety Paper Medical IT Mobile Security Office Cables Update Virus Analysis Training Online Shopping Laptop SSD Movies Company Culture Authorization Tip of the week Processors Help Desk Office 365 Machine Learning Value Law Enforcement Workers Digital Ink Business Technology SaaS IT Management Operating System Content Filtering Voice over Internet Protocol Outlook Antivirus Maintenance Security Cameras Managing Stress Vulnerability User Tip Plug-In Business Continuity Telephony Technology Tips Streaming Media Knowledge Touchscreen Profitability Millennials Dongle PowerPoint GDPR Server Server Management Staff Internet Explorer Gadgets Word Settings Facebook Unified Communications How To Comparison G Suite Spyware Proactive IT Upgrade Voice over IP Big Data Downloads Microsoft Office 365 WannaCry Telecommute Database Eliminating Downtime Edge Sports Storage Environment Threat User Security Wearables Twitter RAM Apple Specifications Bring Your Own Device HP Cybercrime Certification Backup and Disaster Recovery Trends HIPAA Data loss Amazon BYOD Sales Dark Web Network Attached Storage e-waste Chrome Websites Printing Reporting Battery IT budget Inventory iPhone Conferencing Hybrid Cloud Troubleshooting Telecommuting Document Management Alert Thank You Congratulations Quick Tips Disaster Recovery Regulation Printers Healthcare