(415) 246-0101

Microtechs Blog

Intro to Your Tech: Authentication

Intro to Your Tech: Authentication

Authentication is something that even the everyday user of a computer might encounter in different ways. Take, for example, identity authentication. You can use a driver’s license, library card, or even a PIN number. Computers use authentication as a part of their main primary functionality, and it mostly comes in the form of passwords and usernames. We’ll take a closer look into what authentication is and what it does.

Authentication vs Authorization
Authentication is basically the act of saying “Yes, I am who I say I am.” While the two are often considered the same, they are slightly different. Authorization is more along the lines of confirming an identity to access information or materials. In fact, the act of authorization cannot actually occur without authentication happening.

How Authentication Works
A user will provide their credentials, which are then cross-referenced with the credentials that the system has stored in a database. If the credentials match, the user is granted authorization to access the system. Depending on the identity associated with these credentials, authorization can be granted at a variety of levels. For example, management will often have more privileges within their network due to the role they play within an organization.

Two-Factor Authentication
In an effort to improve security, many organizations have turned to a method called two-factor authentication, or 2FA for short. 2FA adds an extra layer of security to accounts that would ordinarily only need a username or password. This code is typically delivered to the user via email, application, or a text message whenever they try to access an account protected by 2FA. The code is one-time, so it will always change upon further login attempts. This creates a situation where accounts can only be accessed if the user has access to the other account associated with the 2FA settings defined by the user, securing them from hackers who don’t have access to both. This is the reason why 2FA is so widely used in the business world.

If your business could use a secondary layer of security (hint: it can!), Microtechs can help. To learn more, reach out to us at (415) 246-0101.

A Short Look at 2018 in Cybersecurity
Which Hosted Solution Are You Depending On?

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, April 24 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity Privacy User Tips Smartphones Internet Tech Term Efficiency Microsoft Communication Google Data Innovation Hardware Email Passwords Cloud Malware Cybersecurity Mobile Device Android Browser Mobile Devices IT Support Business Users Windows 10 Outsourced IT Collaboration Ransomware Network Communications Wi-Fi Managed IT Services Software IT Services Small Business Business Management Hosted Solutions Workplace Tips Hackers Saving Money Managed IT services Applications Data Backup Bandwidth Wireless Holiday Backup Internet of Things Data recovery Chrome Apps Networking VoIp Social Media Business Intelligence Smartphone Blockchain Information Marketing Cloud Computing Employer-Employee Relationship Value Office 365 Analytics Virtual Assistant Virtualization Managed Service Phishing VPN Government Cost Management Office Data Management Excel G Suite Router Compliance Facebook Computer Data Breach Tech Terms Patch Management Remote Computing Computers Data Protection Remote Monitoring and Management Access Control Automation Gmail Save Money BDR Cortana Gadgets Miscellaneous Healthcare Microsoft Office Mobility Net Neutrality Artificial Intelligence Managed IT Service Connectivity Password Paperless Office Medical IT Data Security Wireless Charging Company Culture Authorization Tip of the week Processors Virus Analysis Training Online Shopping Laptop SSD Movies Human Resources Machine Learning Help Desk Sales Cryptocurrency Operating System iPhone Conferencing Voice over Internet Protocol Outlook Workers Digital Ink SaaS Personal Information IT Management Managing Stress Vulnerability Antivirus Maintenance File Sharing Security Cameras Employee-Employer Relationship Plug-In Business Continuity Telephony Technology Tips Streaming Media Tablet Touchscreen Server Management Profitability Millennials Dongle PowerPoint GDPR E-Commerce Server Spyware Staff Internet Explorer Word Settings Unified Communications WannaCry Electronic Health Records Telecommute Database Law Enforcement Proactive IT Upgrade Voice over IP Big Data Downloads Microsoft Office 365 Environment Content Filtering Eliminating Downtime Edge Sports Business Technology Storage Payment Time Management Bring Your Own Device HP Threat Wearables Twitter RAM HIPAA Health Data loss Cybercrime User Tip Certification Backup and Disaster Recovery Trends Knowledge Chrome OS e-waste Amazon BYOD Dark Web instant Messaging Network Attached Storage How To Comparison Hybrid Cloud Troubleshooting Telecommuting Document Management Websites Printing Reporting Battery IT budget Inventory Authentication Hard Drive Employees Spam Tactics eCommerce Physical Security Hard Drives A.I. Microsoft Teams disposal Wireless Internet Error Vulnerabilities Lead Generation Apple Specifications Cables Update Safety Paper User Security Mobile Security Solid State Drive Alert Quick Tips Hard Disk Drive Windows 7 Disaster Recovery Thank You Printers Congratulations Regulation