Send Us An Email

Give us a call

Headquarters

OnSite I.T. Blog

MFA Could be Improved Upon With Adaptive Authentication

MFA Could be Improved Upon With Adaptive Authentication

We’d be the first to admit that, as much as we’d recommend that you use multi-factor authentication wherever it is available, MFA isn’t perfect. This makes the idea that an improvement to these methods is on the horizon an intriguing one. Let’s discuss what may become the new and improved standard fairly soon.

Let’s begin with a review of MFA’s biggest downside: how frustrating it can be.

Multi-Factor Authentication Admittedly Adds Obstacles

Granted, this is the point—by adding additional hurdles to clear before access to an account or data is allowed, the account or data in question is made more secure. However, if there are too many hurdles, too many obstacles for your team to clear, it will help secure your team’s accounts, but at the cost of their satisfaction and ultimately, engagement.

In addition to this, one of the most common means of multi-factor authentication is the use of a smartphone-generated code. This makes it necessary for your team members to have their phones at the ready—something that most of us have learned isn’t totally practical through experience. What if they forget their mobile devices at home, or the battery dies, or it breaks?

How do you expect them to work effectively then?

The security benefits of MFA are clear—but so is the stress that it can potentially cause.

Adaptive Authentication Can Reduce This Stress

Adaptive authentication is a new approach that some organizations have adopted. Here’s how it works:

Rather than relying on proof after proof provided by the user as a means of authentication, adaptive authentication collects different types of data, largely based on user behavior. Chances are, your workday’s processes are pretty consistent from day to day, and you’ve developed a particular way of typing and moving your mouse. Adaptive authentication examines these factors to determine whether or not a user is who they claim to be, building a profile to compare behaviors to and providing access should they match.

If something odd is detected, like an unfamiliar device trying to access your data from a new place at an unusual time, a multi-factor prompt will be requested. Otherwise, you’ll be able to access your resources with minimal friction.

By balancing security with convenience, you strike an ideal compromise that optimizes both.

This kind of approach has been embraced by various industries, and while it may not be available to the typical small-to-medium-sized business just yet, it may be something to keep in mind moving forward. For now, we’re here to help you maintain your business’ productivity and security.

Find out how we can help by giving us a call at (403) 210-2927.

Questions to Consider Before Shifting to the Cloud
Build a More Productive Business with Technology
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Monday, 16 December 2024

Captcha Image

Mobile? Grab this Article

QR Code

Customer Login

Latest Blog

Want to be a business without hearing how artificial intelligence is changing the industry? Good luck; it’s a big deal that this technology has flourished in recent years, and businesses have found all kinds of ways to implement it. While AI has sign...

Contact us

Learn more about what OnSite I.T. can do for your business.

OnSite I.T.
429 14th St. N.W. #104
Calgary, Alberta T2N 2A3, Canada