Page 67 - Cyber Warnings
P. 67







Companies and services like Google have been using this for over a decade now. Say you
want to access your Gmail account. First you enter your login credentials and your password.
Before you gain access to Gmail secondary authentication is required.


For many this comes in the form of a code received via text message directly to the user’s
phone.

Enter this secondary code and you ill then gain access to the account. Don’t have access to a
phone? Not a problem. Secondary authentication can take shape in several forms from texts,
to emails, to automated voice messages, all the way to a human operator calling to give a code.

When told of its efficacy in deterring attacks and breaches, many users are left surprised and
can’t believe that they did not implement this security measure much sooner.

Adding another one or two layers of security may seem like a minor inconvenience to a lot of
people, but the benefits of doing so are inversely proportional to the risks they are exposed to.

The math is pretty easy; the more layers of security you need to access your data, the more
security measures an attacker needs to bypass to gain access to your data. If it’s a little difficult
for you to gain access, it makes it ridiculously difficult for attackers to gain access.




About The Author

David has held positions as Operations Director and Head of IT in legal
and professional firms for more than 10 years. He is a Director and co-
owner of Amazing Support, a Microsoft Silver accredited and specialist
Managed IT Support and IT Services company.

David actively helps SME businesses receive better Managed IT Support
and IT Services in the London and Hertfordshire areas.

He also assists overseas companies who are looking to expand their
business operations into the UK and helps with their inward investment IT process. A
professional member of The Chartered Institute for IT (BCS) and an event speaker promoting
business start-ups and technology awareness.

Married with a son, you will often see him riding his bicycle around the Hertfordshire towns!
David regularly participates in charity bike rides for the British Heart Foundation.

David can be reached online (email [email protected] , Twitter @davidmshare),
and at our company website http://www.amazingsupport.co.uk/







67 Cyber Warnings E-Magazine October 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   62   63   64   65   66   67   68   69   70   71   72