2/1/2020 published by: Softeng

Prepara a tu empresa para trabajar sin contraseñas

There are many companies that are daily affected by security breaches that cause the theft, kidnapping and destruction of confidential information. All these gaps usually have a common origin: compromised user passwords.

In many cases (more than 52%), these gaps are the result of human error (users using the same passwords that they use when registering on certain websites, opening emails requesting to log in to a fraudulent form, using passwords simple, etc.).

In effect, the theft of passwords is being very common and highlights the importance of protecting the user's identity beyond his password, as it will eventually be compromised. A password-protected account is certainly an easy target for attackers.

Not all victims remain anonymous

Recently, a news item was published in the media about the phishing attack suffered by the Valencia municipal urban transport company (EMT) . In this case, the "hackers" sent emails on behalf of a company manager to the head of administration in which he ordered the payment of various financial operations worth 4 million euros and unfortunately the employee trusted making such payments. These types of scams are becoming increasingly relevant among companies that are not adequately protected but do not come to light for obvious reasons (shame). In this case, the company is public and for this reason it has appeared in the media, although indeed, from Softeng we are seeing clients who have not yet opted to protect themselves, suffering similar cases.

How can you prevent something similar from happening in your company?

The solution

You can help prevent some of the identity attacks by adopting a strategy of empowering your employees to protect themselves against phishing, but what will really help you is that it is practically irrelevant that your password is stolen, adding an additional step to authenticate yourself.

Two-step authentication (called MFA ) provides an additional layer of security for your company, being an access control method that allows you to confirm the identity of a user to demonstrate who they say they are. It works by requesting two or more of the following methods of Prepara a tu empresa para trabajar sin contraseñas authentication:

  • An item you know (usually a password or pin).
  • An item that you have (a trusted device, such as a mobile phone or a digital key).
  • A biometric feature that identifies you (a fingerprint or your face).
  • A protected App on your device that allows the user to authorize access.

By using various factors to verify a user's identity, the vast majority of password theft attacks are neutralized as their work multiplies exponentially as they need to "hack" more than one system at the same time to gain access.

Two-step authentication is very easy to use and includes the possibility of configuring trusted locations (branches, offices, ...) for greater security and user comfort.

The recommendation

The usual tips about changing passwords often, or making them complicated, really do no good against the millions of attacks you experience on a daily basis (more than 300 million fraudulent login attempts targeting cloud services). from Microsoft). The idea is, if your password has not been stolen by anyone, why change it? Or .. if your password is already held by a hacker and you don't know it, why wait 2 months to change it?

According to studies, multi-factor authentication solutions block 99.9% of these unauthorized login attempts .

Don't you think the time has come to incorporate it into your company?

How can you have two-step authentication?
This feature is included in the Azure Active Directory Premium subscription and in the packages it contains: A solution that, in addition to helping to guarantee access to applications and data only to people who really are who they say they are, includes the ability to enforce smarter constraints using three key features:

  • Conditional access : To limit access to applications from outside the company (based on group membership, geographic location and device status).
  • Identity protection: Risk-based conditional access. To do this, strange behaviors are analyzed (for example, you have logged in from very distant locations in an impossible time, trying to access from a computer not managed by the organization and others).
  • Management of privileged identities: Administration and protection of administrator accounts, allowing the administrator role to be assigned to a user temporarily, alerting them to the change and supervising their access to resources.

If you want, see all the details of Azure Active Directory Premium

In short, "hackers" have more and more methods at their disposal to obtain the credentials of users and, in most cases, they will end up obtaining it.

Do you want to know more about how to protect the identity of your users? Contact us!


Yes i want to know more

<< back to blog
FacebookTwitterLinkedInWhatsapp
Sending...

Do you want to receive the items in your mailbox?


Suscripciones al Blog Rss Blog