Recent high-profile data breaches have become a permanent concern to many private and public organizations. As the amount of information stored in cloud is growing exponentially new opportunities arise in both positive and negative directions. But a company can’t start protecting its users data unless it doesn’t know what to protect. So a new way of understanding data protection takes its place as advanced technologies and policies are being adopted to protect our valuable data.
Technology identifies us
Today there are more mobile devices than there are people on earth. This number is multiplying five times faster than our population. Our saved passwords, fingerprints, browser history, face recognition, or any other similar data are in many cases more valuable than the device itself. And this way of identification has in many cases become a default condition to, for example, apply for a loan, transfer money, or login to your bank account. So our connectivity devices have strongly started to change the way we understand the opportunities that lie within them.
Minimizing every possible threat
Starting to understand what needs to be protected is definitely a challenging task to any company. Appropriate safeguards can be used in different confidentiality impact levels. So not all personal data should be protected in the same manner. In many cases, it might be necessary to limit the requisite data to accomplish your security and business purpose. As Heartbleed happened the main questions was how to avoid this happening again. There is always the unpredictable factor of human mistake, so what can be done to limit the possibility of accidentally mistreating sensitive data?
Could 2-factor authentication help?
One of the recent hottest topics in cyber security is 2-factor authentication (2FA). Some big names such as Dropbox or LinkedIn have had their lesson with extensive security breaches that resulted in adopting 2FA. More and more companies who work with sensitive data pick up this topic rather at earlier stage to prevent becoming a victim of another massive password leak. So, what do you need to know about 2FA? Impelling your users to adopt 2FA solution will vastly minimize the risk of hacking a single password. Instead, 2FA makes sure that only the user has the access for the key by sending it to their mobile device via different channel such as SMS.
Even more, the password is generated only when the user triggers it and expires after a short time to minimize the leaking possibilities even more. And last but not least, as 2FA uses your mobile device it’s more likely that other layers of security are being used as well, such as passcode or fingerprint protected lock screen. While SMS remains as a secure and reliable technology, 2FA via SMS is surely one of the fastest and securest ways to protect your users sensitive information.
Messente is at Mobile World Congress
If you are going to attend Mobile World Congress at Barcelona on 3rd until 5th of March, don’t hesitate to contact our team (firstname.lastname@example.org) to learn more about 2-factor authentication and how your business can use it.
Read more about What is 2-step verification and why should you care