(415) 246-0101

Microtechs Blog

Intro to Your Tech: Authentication

Intro to Your Tech: Authentication

Authentication is something that even the everyday user of a computer might encounter in different ways. Take, for example, identity authentication. You can use a driver’s license, library card, or even a PIN number. Computers use authentication as a part of their main primary functionality, and it mostly comes in the form of passwords and usernames. We’ll take a closer look into what authentication is and what it does.

Authentication vs Authorization
Authentication is basically the act of saying “Yes, I am who I say I am.” While the two are often considered the same, they are slightly different. Authorization is more along the lines of confirming an identity to access information or materials. In fact, the act of authorization cannot actually occur without authentication happening.

How Authentication Works
A user will provide their credentials, which are then cross-referenced with the credentials that the system has stored in a database. If the credentials match, the user is granted authorization to access the system. Depending on the identity associated with these credentials, authorization can be granted at a variety of levels. For example, management will often have more privileges within their network due to the role they play within an organization.

Two-Factor Authentication
In an effort to improve security, many organizations have turned to a method called two-factor authentication, or 2FA for short. 2FA adds an extra layer of security to accounts that would ordinarily only need a username or password. This code is typically delivered to the user via email, application, or a text message whenever they try to access an account protected by 2FA. The code is one-time, so it will always change upon further login attempts. This creates a situation where accounts can only be accessed if the user has access to the other account associated with the 2FA settings defined by the user, securing them from hackers who don’t have access to both. This is the reason why 2FA is so widely used in the business world.

If your business could use a secondary layer of security (hint: it can!), Microtechs can help. To learn more, reach out to us at (415) 246-0101.

A Short Look at 2018 in Cybersecurity
Which Hosted Solution Are You Depending On?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 13 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Tech Term Internet Privacy Smartphones Cybersecurity Efficiency Browser Cloud Malware Communication User Tips Hardware Android Microsoft Passwords Wi-Fi Productivity Small Business Data Users Hosted Solutions Saving Money Mobile Device Managed IT services Email Communications Ransomware Network Google Software Employer-Employee Relationship Business Management Outsourced IT Internet of Things VoIp Workplace Tips Data recovery Innovation Business Intelligence Applications Blockchain Networking Social Media Collaboration Marketing Information Backup Wireless Mobile Devices IT Support Business Data Backup Managed IT Services Windows 10 Cloud Computing Managed IT Service Wireless Charging BDR Automation Analytics Virtual Assistant Phishing Virtualization Government Managed Service Connectivity Artificial Intelligence Smartphone Router Excel Data Management Compliance Hackers Computer Data Breach Patch Management Tech Terms VPN Data Protection Remote Computing Computers Cortana Cost Management Gmail Miscellaneous Save Money IT Services Bandwidth Threat User Security Error Twitter RAM Apple Specifications Lead Generation Password Wireless Internet Data loss Cybercrime Paperless Office Medical IT Backup and Disaster Recovery Trends Cables Update Chrome Tip of the week Processors Analysis Sales Online Shopping Laptop Company Culture Authorization e-waste Websites Printing Office 365 Inventory iPhone Conferencing Spam Tactics File Sharing Workers Digital SaaS Hard Drives A.I. IT Management Voice over Internet Protocol Outlook Vulnerability Tablet Managing Stress disposal Plug-In Safety Paper Telephony Touchscreen Mobile Security Office Virus Millennials GDPR SSD Movies Server Profitability Value Law Enforcement Spyware Apps Settings G Suite Machine Learning Proactive IT Ink Business Technology Voice over IP Big Data Microsoft Office 365 Operating System Content Filtering WannaCry Antivirus Maintenance Edge Storage Eliminating Downtime User Tip HP Technology Tips Streaming Media Knowledge Bring Your Own Device HIPAA Remote Monitoring and Management Dongle PowerPoint Holiday Access Control Server Management Staff Internet Explorer Gadgets Dark Web Facebook Unified Communications How To Comparison Network Attached Storage Amazon BYOD Telecommute Database Telecommuting Document Management Reporting Downloads Battery IT budget Hybrid Cloud Troubleshooting Hard Drive Microsoft Office Sports eCommerce Physical Security Microsoft Teams Authentication Environment Quick Tips Alert Thank You Disaster Recovery Congratulations Regulation Printers