Nex-Tech Blog | Technology Tips and Tricks | Industry News

Ask A Pro: What is Multifactor Authentication (MFA)?

Posted by Olga Detrixhe on Jun 29, 2021 9:47:54 AM
Multifactor Authentication (MFA) is a safety precaution IT managers may take to require two or more user verification factors when accessing a network, an application, or specific data. Typical scenarios include combining something the user knows, such as a password, alongside something the user has like a token, a code, face recognition, or fingerprints. 

MFA is now acknowledged as a best practice in the IT world and is quickly being adopted by many companies to protect access to their network or core applications. It is commonly implemented by integrating an app such as Duo with Microsoft Azure Active Directory and can be managed centrally. 

Using the Duo/ Microsoft Azure Active Directory combination, end-users log in with their password and are prompted via a phone app to approve or deny the request, or alternatively, to enter an authentication code. The process is easy and minimally disruptive, especially for users who connect remotely. 

MFA is also on the rise in the physical security world. For example, Salto’s electronic access control system can be programmed to require MFA for door access, and it is one of the easiest, most cost-effective ways to protect business structures.
 
Questions? Call 877.625.7872
Request a  FREE cybersecurity assessment.
Request a FREE physical security assessment.
Read More

Topics: Cybersecurity, Internet, Multifactor Authentication, MFA, Physical Security

New Challenge, Life-long Passion Introducing Maggie Basgall

Posted by Olga Detrixhe on Mar 25, 2021 1:39:43 PM

 

Many of you have had the opportunity to work with, listen to, or golf with Megan Keiswetter in the past. As Nex-Tech’s expert in all things marketing she did a great job representing the Nex-Tech Advertising Solutions team and we wish her well as she embarks on a new journey. Enter Maggie Basgall, who is taking over Megan’s role as Advertising Solutions Representative at Nex-Tech.

Read More

Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing

Cybersecurity—The #1 Threat Right Now and How Not to Fall For It

Posted by Olga Detrixhe on Mar 25, 2021 1:27:59 PM

 

Read More

Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing

FCC Approves 988 as New Dialing Procedure to Reach National Suicide Prevention Lifeline

Posted by Dustin Schlaefli on Mar 25, 2021 12:11:24 PM

Read More

Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing

Kari's Law and Baum's Act. How Will it Affect my Business?

Posted by Darren Walters on Mar 25, 2021 11:32:13 AM

 

As some business owners and technology professionals may know, in February of 2018, President Donald J. Trump signed into law two statutes intended to improve emergency calling situations. These laws took effect on February 16, 2020, and may require changes and enhancements to customer's telephone systems and/or services.

Here are the details you need to know.

Read More

Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing

Cordell Newsletter Spring 2021

Posted by Bill Mathews on Mar 4, 2021 1:25:50 PM

Read More

Topics: Nex-Tech, Network Monitoring, Carrier, Cybersecurity, NOC, CALEA, Security, Business, Tech Tips, Search Engine Optimization, Communication, cybercrime

Cordell Newsletter Winter 2020

Posted by Bill Mathews on Dec 2, 2020 8:37:32 AM

Cordell News

Read More

Topics: Nex-Tech, Network Monitoring, Carrier, Cybersecurity, NOC, CALEA, Security, Business, Tech Tips, Search Engine Optimization, Communication, cybercrime

Why Does the Webcam Need To Be On?

Posted by Steve Riat on Oct 7, 2020 3:58:34 PM

Well, why does the webcam need to be on?

Read More

Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing

DON'T Do What You're Told (Until you know the request is real)

Posted by Shannon Rothchild on Sep 30, 2020 3:50:57 PM

If you are like me, one of the first items you do each day is check your e-mail. Picture this, it is Tuesday morning and you have just poured your favorite drink and sat down at your desk. You open Outlook to see what fun things email has in store for you today.

Read More

Topics: Cybersecurity, Managed IT, Business, Technology, Budget, Phishing

­­How to Assess Physical Risk to Your Business—Five Steps to Get You Started

Posted by Olga Detrixhe on Sep 30, 2020 3:46:50 PM

Let’s talk security. It’s everywhere, whether your business has 5 or 500 employees: encryption for your emails, surveillance cameras, or all the cloud services requiring multi-factor authentication. IT departments can’t get around it anymore, but it’s still a tough and complex conversation, especially when budget time comes.

Read More

Topics: Cybersecurity, Security, SecureIT, Tech Tips, cybercrime, Phishing

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all