{"id":1925,"date":"2021-09-17T09:46:59","date_gmt":"2021-09-17T08:46:59","guid":{"rendered":"https:\/\/www.netprimates.com\/?p=1925"},"modified":"2023-08-08T10:05:38","modified_gmt":"2023-08-08T09:05:38","slug":"3-vital-phases-of-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/","title":{"rendered":"3 vital phases of Multi Factor Authentication"},"content":{"rendered":"\r\n

We regularly write about Multi Factor Authentication (MFA) because it is a vital tool in the cyber security\u00a0armoury.\u00a0In March we\u00a0blogged\u00a0about how important it is to turn\u00a0MFA<\/a>\u00a0on whenever you\u2019re given the opportunity, such as with bank accounts and social media. Today\u2019s\u00a0blog explains why we need to be proactive in seeking out MFA\u00a0within business, only using suppliers that provide it as standard.\u00a0<\/strong><\/p>\r\n\r\n\r\n\r\n

Phase 1 \u2013 email\u00a0accounts\u00a0<\/h2>\r\n\r\n\r\n\r\n

There are three phases to MFA deployment.\u00a0Firstly,\u00a0start with email.\u00a0\u00a0<\/p>\r\n\r\n\r\n\r\n

Most cyberattacks arrive via email, so get this base covered first.\u00a0Think about the amount and type of information that is circulated via email and you soon\u00a0realise\u00a0how essential it is to\u00a0add\u00a0protection. Not only are\u00a0our inboxes filled with information, but a lot of the data will belong\u00a0to our customers. Not only should\u00a0we protect ourselves and our businesses, but also\u00a0recognise\u00a0the responsibilities we have to those that have trusted us. Take that trust seriously and\u00a0do everything within your power to protect email data.\u00a0\u00a0<\/p>\r\n\r\n\r\n\r\n

Your email mailboxes can become a communication gateway if they\u2019re left unprotected. Think about all the information contained within your business systems and how useful it could prove to criminals.\u00a0<\/p>\r\n\r\n\r\n\r\n

Phase 2\u00a0\u2013\u00a0accounts, payroll and HR systems\u00a0<\/h2>\r\n\r\n\r\n\r\n

Look\u00a0specifically at\u00a0MFA for\u00a0systems used\u00a0by\u00a0Accounts, Payroll and HR.\u00a0\u00a0<\/p>\r\n\r\n\r\n\r\n

Much of\u00a0the data stored and used by Accounts and Payroll\u00a0contains\u00a0monetary information, such as bank account details. This information is like gold dust for hackers. There is so much data that can be lost to cybercriminals \u2013 don’t give them the chance to strike.\u00a0\u00a0<\/p>\r\n\r\n\r\n\r\n

Your\u00a0Human Resources department\u00a0will\u00a0also\u00a0have a wealth of information on current and former employees. Combined with payroll data,\u00a0there will be enough information to successfully apply for a credit card.\u00a0So, once you have your email accounts protected, make sure MFA is also protecting your most sensitive systems.\u00a0<\/p>\r\n\r\n\r\n\r\n

Phase 3 \u2013 every portal and system\u00a0<\/h2>\r\n\r\n\r\n\r\n

As an\u00a0organisation\u00a0make it policy to only use platforms and suppliers that support MFA.\u00a0We appreciate that this could appear to add complexity and time to tasks, but it\u2019s time and effort well spent.\u00a0At Net Primates we won\u2019t sign up for any system or service that doesn\u2019t allow MFA. Trusted suppliers will be keen to help you remain secure; we are all in this together,\u00a0after all.\u00a0<\/p>\r\n\r\n\r\n\r\n

Where to start\u00a0<\/h2>\r\n\r\n\r\n\r\n

We always endorse baby steps and don\u2019t want you to feel overwhelmed. Doing something is always better than nothing, so\u00a0where are you going to start TODAY? Even if you don\u2019t know where to start, make a plan to a find out more. You can always ask us at Net Primates. We\u2019re committed to\u00a0IT Security \u2013 without it we are all targets \u2013 and we\u2019ll do whatever we can to help keep you safe.\u00a0<\/p>\r\n","protected":false},"excerpt":{"rendered":"

We regularly write about Multi Factor Authentication (MFA) because it is a vital tool in the cyber security\u00a0armoury.\u00a0In March we\u00a0blogged\u00a0about how important it is to turn\u00a0MFA\u00a0on whenever you\u2019re given the opportunity, such as with bank accounts and social media. Today\u2019s\u00a0blog explains why we need to be proactive in seeking out MFA\u00a0within business, only using suppliers that provide it as standard.\u00a0 Phase 1 \u2013 email\u00a0accounts\u00a0 There are three phases to MFA deployment.\u00a0Firstly,\u00a0start with email.\u00a0\u00a0 Most cyberattacks arrive via email, so get this base covered first.\u00a0Think about the amount and type of information that is circulated via email and you soon\u00a0realise\u00a0how essential it is to\u00a0add\u00a0protection. Not only are\u00a0our inboxes filled with information, but a lot of the data will belong\u00a0to our customers. Not only should\u00a0we protect ourselves and our businesses, but also\u00a0recognise\u00a0the responsibilities we have to those that have trusted us. Take that trust seriously and\u00a0do everything within your power to protect email data.\u00a0\u00a0 Your email mailboxes can become a communication gateway if they\u2019re left unprotected. Think about all the information contained within your business systems and how useful it could prove to criminals.\u00a0 Phase 2\u00a0\u2013\u00a0accounts, payroll and HR systems\u00a0 Look\u00a0specifically at\u00a0MFA for\u00a0systems used\u00a0by\u00a0Accounts, Payroll and HR.\u00a0\u00a0 Much of\u00a0the data stored and used by Accounts and Payroll\u00a0contains\u00a0monetary information, such as bank account details. This information is like gold dust for hackers. There is so much data that can be lost to cybercriminals \u2013 don’t give them the chance to strike.\u00a0\u00a0 Your\u00a0Human Resources…<\/p>\n","protected":false},"author":2,"featured_media":2701,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[15],"tags":[],"acf":[],"yoast_head":"\n3 vital phases of Multi Factor Authentication - Net Primates<\/title>\n<meta name=\"description\" content=\"Why we need to be proactive in seeking out MFA\u00a0within business, only using suppliers that provide it as standard.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 vital phases of Multi Factor Authentication - Net Primates\" \/>\n<meta property=\"og:description\" content=\"Why we need to be proactive in seeking out MFA\u00a0within business, only using suppliers that provide it as standard.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"Net Primates\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netprimates\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-17T08:46:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-08T09:05:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2021\/09\/Umbrellas-Brian-Jackson-lores.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"560\" \/>\n\t<meta property=\"og:image:height\" content=\"389\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"freestyle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netprimates\" \/>\n<meta name=\"twitter:site\" content=\"@netprimates\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"freestyle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/\"},\"author\":{\"name\":\"freestyle\",\"@id\":\"https:\/\/www.netprimates.com\/#\/schema\/person\/83ed91e8f40648c90a65a894b8306d34\"},\"headline\":\"3 vital phases of Multi Factor Authentication\",\"datePublished\":\"2021-09-17T08:46:59+00:00\",\"dateModified\":\"2023-08-08T09:05:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/\"},\"wordCount\":482,\"publisher\":{\"@id\":\"https:\/\/www.netprimates.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2021\/09\/Umbrellas-Brian-Jackson-lores.jpg\",\"articleSection\":[\"IT & Cyber Security Tips\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/\",\"url\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/\",\"name\":\"3 vital phases of Multi Factor Authentication - Net Primates\",\"isPartOf\":{\"@id\":\"https:\/\/www.netprimates.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2021\/09\/Umbrellas-Brian-Jackson-lores.jpg\",\"datePublished\":\"2021-09-17T08:46:59+00:00\",\"dateModified\":\"2023-08-08T09:05:38+00:00\",\"description\":\"Why we need to be proactive in seeking out MFA\u00a0within business, only using suppliers that provide it as standard.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#primaryimage\",\"url\":\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2021\/09\/Umbrellas-Brian-Jackson-lores.jpg\",\"contentUrl\":\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2021\/09\/Umbrellas-Brian-Jackson-lores.jpg\",\"width\":560,\"height\":389,\"caption\":\"Confident businessman with three umbrellas concept for more than adequate ample insurance cover or failsafe backup plan\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.netprimates.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 vital phases of Multi Factor Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.netprimates.com\/#website\",\"url\":\"https:\/\/www.netprimates.com\/\",\"name\":\"Net Primates\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.netprimates.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.netprimates.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.netprimates.com\/#organization\",\"name\":\"Net Primates\",\"url\":\"https:\/\/www.netprimates.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.netprimates.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2023\/08\/Net-Primates-organisation-logo.jpg\",\"contentUrl\":\"https:\/\/www.netprimates.com\/wp-content\/uploads\/2023\/08\/Net-Primates-organisation-logo.jpg\",\"width\":1000,\"height\":1000,\"caption\":\"Net Primates\"},\"image\":{\"@id\":\"https:\/\/www.netprimates.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/netprimates\",\"https:\/\/x.com\/netprimates\",\"https:\/\/www.linkedin.com\/company\/net-primates-ltd\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.netprimates.com\/#\/schema\/person\/83ed91e8f40648c90a65a894b8306d34\",\"name\":\"freestyle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.netprimates.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d407275e219c6069a44809530143596a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d407275e219c6069a44809530143596a?s=96&d=mm&r=g\",\"caption\":\"freestyle\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 vital phases of Multi Factor Authentication - Net Primates","description":"Why we need to be proactive in seeking out MFA\u00a0within business, only using suppliers that provide it as standard.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/","og_locale":"en_GB","og_type":"article","og_title":"3 vital phases of Multi Factor Authentication - Net Primates","og_description":"Why we need to be proactive in seeking out MFA\u00a0within business, only using suppliers that provide it as standard.\u00a0","og_url":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/","og_site_name":"Net Primates","article_publisher":"https:\/\/www.facebook.com\/netprimates","article_published_time":"2021-09-17T08:46:59+00:00","article_modified_time":"2023-08-08T09:05:38+00:00","og_image":[{"width":560,"height":389,"url":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2021\/09\/Umbrellas-Brian-Jackson-lores.jpg","type":"image\/jpeg"}],"author":"freestyle","twitter_card":"summary_large_image","twitter_creator":"@netprimates","twitter_site":"@netprimates","twitter_misc":{"Written by":"freestyle","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#article","isPartOf":{"@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/"},"author":{"name":"freestyle","@id":"https:\/\/www.netprimates.com\/#\/schema\/person\/83ed91e8f40648c90a65a894b8306d34"},"headline":"3 vital phases of Multi Factor Authentication","datePublished":"2021-09-17T08:46:59+00:00","dateModified":"2023-08-08T09:05:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/"},"wordCount":482,"publisher":{"@id":"https:\/\/www.netprimates.com\/#organization"},"image":{"@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2021\/09\/Umbrellas-Brian-Jackson-lores.jpg","articleSection":["IT & Cyber Security Tips"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/","url":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/","name":"3 vital phases of Multi Factor Authentication - Net Primates","isPartOf":{"@id":"https:\/\/www.netprimates.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#primaryimage"},"image":{"@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2021\/09\/Umbrellas-Brian-Jackson-lores.jpg","datePublished":"2021-09-17T08:46:59+00:00","dateModified":"2023-08-08T09:05:38+00:00","description":"Why we need to be proactive in seeking out MFA\u00a0within business, only using suppliers that provide it as standard.\u00a0","breadcrumb":{"@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#primaryimage","url":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2021\/09\/Umbrellas-Brian-Jackson-lores.jpg","contentUrl":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2021\/09\/Umbrellas-Brian-Jackson-lores.jpg","width":560,"height":389,"caption":"Confident businessman with three umbrellas concept for more than adequate ample insurance cover or failsafe backup plan"},{"@type":"BreadcrumbList","@id":"https:\/\/www.netprimates.com\/it-cyber-security-tips\/3-vital-phases-of-multi-factor-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.netprimates.com\/"},{"@type":"ListItem","position":2,"name":"3 vital phases of Multi Factor Authentication"}]},{"@type":"WebSite","@id":"https:\/\/www.netprimates.com\/#website","url":"https:\/\/www.netprimates.com\/","name":"Net Primates","description":"","publisher":{"@id":"https:\/\/www.netprimates.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.netprimates.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.netprimates.com\/#organization","name":"Net Primates","url":"https:\/\/www.netprimates.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.netprimates.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2023\/08\/Net-Primates-organisation-logo.jpg","contentUrl":"https:\/\/www.netprimates.com\/wp-content\/uploads\/2023\/08\/Net-Primates-organisation-logo.jpg","width":1000,"height":1000,"caption":"Net Primates"},"image":{"@id":"https:\/\/www.netprimates.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netprimates","https:\/\/x.com\/netprimates","https:\/\/www.linkedin.com\/company\/net-primates-ltd\/"]},{"@type":"Person","@id":"https:\/\/www.netprimates.com\/#\/schema\/person\/83ed91e8f40648c90a65a894b8306d34","name":"freestyle","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.netprimates.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d407275e219c6069a44809530143596a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d407275e219c6069a44809530143596a?s=96&d=mm&r=g","caption":"freestyle"}}]}},"_links":{"self":[{"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/posts\/1925"}],"collection":[{"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/comments?post=1925"}],"version-history":[{"count":0,"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/posts\/1925\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/media\/2701"}],"wp:attachment":[{"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/media?parent=1925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/categories?post=1925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netprimates.com\/wp-json\/wp\/v2\/tags?post=1925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}