(415) 246-0101

Microtechs Blog

Intro to Your Tech: Authentication

Intro to Your Tech: Authentication

Authentication is something that even the everyday user of a computer might encounter in different ways. Take, for example, identity authentication. You can use a driver’s license, library card, or even a PIN number. Computers use authentication as a part of their main primary functionality, and it mostly comes in the form of passwords and usernames. We’ll take a closer look into what authentication is and what it does.

Authentication vs Authorization
Authentication is basically the act of saying “Yes, I am who I say I am.” While the two are often considered the same, they are slightly different. Authorization is more along the lines of confirming an identity to access information or materials. In fact, the act of authorization cannot actually occur without authentication happening.

How Authentication Works
A user will provide their credentials, which are then cross-referenced with the credentials that the system has stored in a database. If the credentials match, the user is granted authorization to access the system. Depending on the identity associated with these credentials, authorization can be granted at a variety of levels. For example, management will often have more privileges within their network due to the role they play within an organization.

Two-Factor Authentication
In an effort to improve security, many organizations have turned to a method called two-factor authentication, or 2FA for short. 2FA adds an extra layer of security to accounts that would ordinarily only need a username or password. This code is typically delivered to the user via email, application, or a text message whenever they try to access an account protected by 2FA. The code is one-time, so it will always change upon further login attempts. This creates a situation where accounts can only be accessed if the user has access to the other account associated with the 2FA settings defined by the user, securing them from hackers who don’t have access to both. This is the reason why 2FA is so widely used in the business world.

If your business could use a secondary layer of security (hint: it can!), Microtechs can help. To learn more, reach out to us at (415) 246-0101.

A Short Look at 2018 in Cybersecurity
Which Hosted Solution Are You Depending On?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, September 23 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Tech Term Network Security Privacy Cybersecurity Smartphones Malware Hardware Passwords Cloud Internet User Tips Managed IT services Ransomware Communications Microsoft Wi-Fi Communication Google Data Hosted Solutions Android Business Intelligence Browser Email Social Media Collaboration Blockchain Applications Productivity Mobile Devices Backup IT Support Network Software Employer-Employee Relationship Small Business Business Management Saving Money Efficiency Innovation Government Users Hackers Networking Data Management Smartphone Router Excel Mobile Device VPN Workplace Tips Computer Cost Management Marketing Tech Terms Data Breach Remote Computing Wireless Computers Patch Management Data Protection Data Backup Save Money Cortana Bandwidth Business Gmail Miscellaneous Cloud Computing Compliance Automation Managed IT Service Information Windows 10 BDR Internet of Things IT Services Wireless Charging Outsourced IT Artificial Intelligence Analytics Data recovery Virtual Assistant VoIp Virtualization Phishing Error Machine Learning Value Telephony Tablet Apps Operating System Millennials Cables Ink Server Medical IT Office Spyware Company Culture Authorization Antivirus Maintenance Settings Analysis Law Enforcement Voice over IP Big Data Technology Tips Streaming Media WannaCry Server Management Edge Voice over Internet Protocol Business Technology Dongle PowerPoint SaaS Content Filtering Facebook Unified Communications HP Managing Stress Staff Internet Explorer Managed Service HIPAA Touchscreen User Tip Telecommute Database Holiday Plug-In Knowledge Downloads Environment Sports Network Attached Storage GDPR Twitter RAM Telecommuting Document Management Gadgets G Suite Threat Battery IT budget How To Comparison Managed IT Services Hard Drive Microsoft Office 365 Data loss Cybercrime eCommerce Physical Security Proactive IT Backup and Disaster Recovery Trends e-waste Lead Generation Password Storage Inventory Paperless Office Bring Your Own Device User Security Websites Printing Apple Specifications A.I. Tip of the week Processors Access Control Spam Tactics Online Shopping Laptop Remote Monitoring and Management Hard Drives Chrome Dark Web disposal Office 365 Amazon Sales Connectivity Mobile Security Workers Digital Hybrid Cloud Safety Paper IT Management iPhone Reporting Conferencing SSD Movies Vulnerability Microsoft Teams File Sharing Authentication Virus Microsoft Office Thank You Congratulations Quick Tips Disaster Recovery Printers Regulation Troubleshooting Alert