Feed Icon
Transcript

Things to Consider for Multifactor Authentication Implementation

When a business considers implementing multifactor authentication – or MFA – to enhance online, VPN, or application security, there are many things to keep in mind.

MFA significantly boosts cybersecurity by requiring at least two ways to authenticate users before they can access things such as your business network or vital accounts. These methods include something a person knows, such as a password; something they have, such as a smartphone or token; or something inherent to them, such as a fingerprint.

Among the first things to consider are the MFA technology you plan to use, the cost and installation of the methods you choose, and who will be required to use MFA.

Top priority for using MFA access would be system administrators and managers who could become prime targets for hackers. You may also want to include employees who log in to your network from home or who travel frequently for business.

Prior to implementation, anyone required to use MFA should be taught how to use it and who to contact for help in case of problems.

You’ll also want to establish procedures for reporting lost devices such as smartphones or tokens, and how IT will respond to protect accounts should the devices fall into the wrong hands.

When choosing an MFA option, check with your company’s existing single-sign on provider, as they may offer MFA solutions, or search the web for reputable MFA solution companies.

While instituting MFA will require some expenses, training, and ongoing monitoring, it can protect a business from cyberattacks that could lead to loss of customer and employee data or financial information that could be costly to the future of your business.