Have a Question?
-
General Security FAQs
- How do I stop phone scams?
- What does cyber security training involve?
- Why do businesses need cyber security training?
- Do I need antivirus on my mobile phone?
- Where Can I Get Free Cyber Security Advice?
- Are security assessments needed within education settings?
- Do I need to worry about security of cloud-based systems we use?
- We’re a small company do we need to worry about cyber security?
- I have anti-virus software do I need more than this?
-
Our Services
-
Securing your business
- What does cyber security training involve?
- Why do businesses need cyber security training?
- How do I secure Amazon Web Services?
- How can we secure Google Workspace (G-Suite)?
- What is the Best Antivirus Software?
- Who Should Be Responsible for Security in a Business?
- What is Microsoft SecureScore?
- What Does a Virtual CISO Do?
- How Secure Are Chromebooks?
- Can I Use the Same Password Everywhere?
- What is a Vulnerability Assessment?
- What is Disaster Recovery?
- How Long Should My Password Be?
- What is a Password Manager?
- How Often Should I Change My Password?
- What is a Business Continuity Plan?
- Show all articles ( 1 ) Collapse Articles
-
Standards & Frameworks
- Does ISO 27001 Cover GDPR?
- What is HIPAA?
- What is PCI DSS?
- How is Cyber Essentials Assessed?
- What are the ISO 27001 Controls?
- How Long Are Cyber Essentials Certificates Valid For?
- Does Cyber Essentials Cover GDPR?
- What is Cyber Essentials?
- What is the Difference Between Cyber Essentials and Cyber Essentials PLUS?
- What are the benefits of ISO 27001?
- What is ISO 27001?
-
Laws & Regulations
-
Cyber Security Glossary
- What is Tailgaiting?
- What is PreTexting?
- What is Scareware?
- What is Baiting?
- What is Penetration Testing?
- What is Ethical Hacking?
- What is XSS?
- What is WAF?
- What is VPN?
- What is TVM?
- What is SSO?
- What is SQLI?
- What is SOAR?
- What is SIEM?
- What is RBAC?
- What is RAT?
- What is PCI-DSS?
- What is OSINT?
- What is NIST?
- What is NCSC?
- What is MFA?
- What is MAC?
- What is ISO?
- What is IPS?
- What is IOT?
- What is IOC?
- What is IDS?
- What is HTTPS?
- What is HIPAA?
- What is GDPR?
- What is EDR?
- What is DLP?
- What is DDoS?
- What is DOS?
- What is DAC?
- What is CVSS?
- What is CND?
- What is CISSP?
- What is CISO?
- What is the CIA Triad?
- What is AV?
- What is AC?
- What is APT?
- What is 2FA?
- What is a Virtual CISO or vCISO?
- What is Blue Teaming?
- What is Purple Teaming?
- What is a Zero-Day Vulnerability?
- What is a Zero-Day Attack?
- What is XSS (Cross-Site Scripting)?
- What is a Worm?
- What is White Teaming?
- What is Whaling?
- What is a Watering Hole Attack?
- What is Vulnerability?
- What is a VPN (Virtual Private Network)?
- What is a Virus?
- What is URL Injection?
- What is a Trojan?
- What is a Threat Actor?
- What is Steganography?
- What is SQL Injection?
- What is Spyware?
- What is Website Spoofing?
- What is Spear-Phishing?
- What is Spam?
- What is Social Engineering?
- What is Smishing?
- What is Single Sign-On (SSO)?
- What is Sextortion?
- What is a Sandbox?
- What is Salting?
- What is an RPO (Recovery Point Objective)?
- What is a Rootkit?
- What is a Remote Access Trojan (RAT)?
- What is Red Teaming?
- What is Ransomware?
- What is PII (Personally Identifiable Information)?
- What is a firewall?
- What is "cyber security"?
- Show all articles ( 65 ) Collapse Articles
-
Cyber Threats
What is MFA?
0 out of 5 stars
| 5 Stars | 0% | |
| 4 Stars | 0% | |
| 3 Stars | 0% | |
| 2 Stars | 0% | |
| 1 Stars | 0% |
MFA is the acronym for “Multi Factor Authentication”.
MFA is that extra layer of security much needed in todays increasingly connected world. Instead of relying on just a username, password, or PIN to protect your business, implementing MFA wherever your business is exposed to the internet will require an extra method of authentication, before access is granted.
The extra layer of security you get with Multi-Factor Authentication is based around the simple concept of requiring multiple ‘factors’ to confirm that anyone attempting to access your business, is actually who they say they are. The theory goes, that if you can provide at least two of the following factors when accessing your email or mobile device for example, there’s a good chance it is actually you who is trying to gain access, keeping sensitive data and information in the right hands:
- Something you are – biometrics, so a fingerprint or retina scan for example
- Something you have – a security token, a mobile phone or other such device, or a keycard
- Something you know – a password or a PIN
With MFA in use you are building much needed layers of security, talk to us today to see how we can support your organisation to adopt best practice.
0 out of 5 stars
| 5 Stars | 0% | |
| 4 Stars | 0% | |
| 3 Stars | 0% | |
| 2 Stars | 0% | |
| 1 Stars | 0% |