{"id":374,"date":"2022-10-24T19:04:29","date_gmt":"2022-10-24T19:04:29","guid":{"rendered":"https:\/\/rm73v2idht.onrocket.site\/?p=374"},"modified":"2022-11-22T18:48:58","modified_gmt":"2022-11-22T18:48:58","slug":"cyber-security-challenge-level-4-always-enable-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/blog.integrityfirstins.biz\/?p=374","title":{"rendered":"Cyber Security Challenge Level 4: Always enable multi-factor authentication"},"content":{"rendered":"\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Cyber Security Challenge Level 4: Always enable multi-factor authentication\" width=\"584\" height=\"329\" src=\"https:\/\/www.youtube.com\/embed\/TcomK88h8iU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Welcome to the level up your cyber security in October program courtesy of integrity first Corporation.\u00a0<\/p>\n\n\n\n<p>We&#8217;re on level four, the final week, which is enabling multi-factor authentication, or you might know it as two factor authentication.&nbsp;<\/p>\n\n\n\n<p>Now in computer security an authentication factor is anything you use to authenticate yourself with a system. Using a password is the most common type of authentication. With multi factor authentication, MFA, or two factor authentication 2FA, you use two or more different factors to log in.&nbsp;<\/p>\n\n\n\n<p>One example is a password and a verification code sent to your smartphone. This is something that&#8217;s really common whenever you sign into banks. This is an extra layer of security. So even if one of your factors is stolen, like your password, the hacker doesn&#8217;t have access to the other authentication factor like your phone.&nbsp;<\/p>\n\n\n\n<p>This stops them from accessing your account. As more and more organizations implement multi-factor authentication to strengthen their security practices, you might encounter different types of authentication factors.&nbsp;<\/p>\n\n\n\n<p>There are three different types you might be asked to provide. So something you know, which are passwords and security questions. Something you have, such as a verification code on your phone or a key card or something you are such as biometrics, like your fingerprint or a scan of your face. The more factors you use, the better your security.&nbsp;<\/p>\n\n\n\n<p>Having a combination of authentication factors is an even better way to keep your data protected.&nbsp;<\/p>\n\n\n\n<p>If you have any questions about any of these levels, please contact integrity first Corporation for help.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the level up your cyber security in October program courtesy of integrity first Corporation.\u00a0 We&#8217;re on level four, the final week, which is enabling multi-factor authentication, or you might know it as two factor authentication.&nbsp; Now in computer &hellip; <a href=\"https:\/\/blog.integrityfirstins.biz\/?p=374\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-374","post","type-post","status-publish","format-standard","hentry","category-cyber-liability-insurance"],"_links":{"self":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=374"}],"version-history":[{"count":1,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/374\/revisions"}],"predecessor-version":[{"id":375,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/374\/revisions\/375"}],"wp:attachment":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}