August 10, 2018//Ellen NeveuxLast Updated: April 30, 2021
We live in a world that thrives on the idea of keeping our personal information secure, and most of this data is held on devices we use every day—cell phones and computers. For phones, we started with password pins, then companies incorporated fingerprint scanners, and now we have facial recognition built into newer models. Most computers still only need a simple password to enter, but it seems like things will become more secure in the future.
As we know, password security habits for consumers aren’t the greatest, but when security protocols are built-in to technology, it helps to illuminate the importance of security at the individual level. Then, hopefully, this will lead to enhanced habits of protecting data at the enterprise level. Both phone and software companies are taking measures into their own hands by having security features built into consumer products, so let’s take a look at how non-security companies are completely changing the personal security game.
One of the biggest integrations of a security protocol is multi-factor authentication (MFA). According to TechTarget, MFA is a security system that requires two or more methods of authentication from different categories that verify a user’s identity to log in. The purpose of MFA is to have a layered defense that makes it harder for an unauthorized individual to gain access to sensitive information. There are three common credentials for MFA used to put this protocol into action: what the user knows (a password), what the user has (a security token), and who the user is (a biometric verification).
Cell phones connections to MFA
Most, if not all, phone companies have incorporated extra security into their phones that work with MFA credentials. Whether it comes in the form of a password, fingerprint sensor, or facial recognition, entering into someone else’s phone is getting harder to do. In many cases, the password is added to either a fingerprint sensor or facial recognition, so if either fails, a user will be prompted to enter their password. With these additions to phones, it allows MFA to be easily achieved for heightened security measures.
Biometrics have gotten a bad reputation because they are intrinsic and that means they cannot be changed, but they work great when paired with other security measures (e.g. something a user knows and something a user has). According to CNET, there is only a 1 in 50,000 chance that a random person can fool the fingerprint sensor; while the chance of fooling facial recognition is 1 in a million. By offering all three options within MFA on a singular platform, these cell phone companies are making security streamlined and easily accessible for users.
Ransomware is malware that is delivered to a victim’s device or devices on a breached network. Victims are exposed to malware in many forms, the most common of which is an email phishing campaign. However an attacker accesses a network, system, or an application their end game is to encrypt important data. KnowBe4’s Ransomware Hostage Rescue Manual says there are four potential responses once attacked, in order from best to worst they are: restore from a backup, decrypt files on your own, do nothing, or pay the ransom.
Software battles ransomware
A file sync and share service company announced at the Black Hat USA 2018 information security event that enterprise customers who use their platform have nothing to fear from ransomware attacks anymore. Why? Because they are making changes so that administrators can trace back to where the attack happened and reverse the damage on a per-user and per-file basis. According to PC Magazine, software companies already allow a high level of control over data, but now the control will be even more enhanced because it will reverse ransomware. This means that no data will be lost, no ransom has to be paid, and there will be only a small downtime.
Why this matters
Security habits aren’t just important between enterprise organizations and their vendors, rather, healthy habits start at the individual level. When individuals see security protocols being used in their day-to-day life it creates a good habit while also allowing individuals to takes control of their personal security. In other words, it lays the groundwork necessary to create good security habits while emphasizing the need for security in all areas of our lives.
Our sole focus is secure third-party remote access. For highly regulated enterprise organizations, SecureLink Enterprise has pioneered a secure remote access platform. SecureLink for enterprise allows an organization to identify, control, and audit third-party vendors. For vendors, SecureLink is the gold standard remote access support platform because it is easy, efficient, and ensures compliance and reduces liability when supporting customers.