{"id":6022,"date":"2014-08-29T21:38:40","date_gmt":"2014-08-29T20:38:40","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6022"},"modified":"2021-07-12T14:49:25","modified_gmt":"2021-07-12T13:49:25","slug":"increase-security-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication","title":{"rendered":"Increase security with two-factor authentication"},"content":{"rendered":"<p>Passwords are a security nightmare. Any system is only as secure as it\u2019s weakest link and the human element inherent in passwords makes them insecure. Most MSPs and Solution Providers have a story of finding a password on a note taped to a monitor, or to the back of a phone, or written down on the desk by the keyboard.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2838 alignright\" src=\"\/wp-content\/uploads\/blog\/maxiq\/2014\/08\/Password-Security-350x173.jpg\" alt=\"Password-Security\" width=\"350\" height=\"173\" data-entity-type=\"\" data-entity-uuid=\"\" \/>The basic premise of a password, of course, is the idea that you are verifying your identity by providing a token of identity. In this case, it\u2019s information you have, or \u201csomething you know.\u201d Many things can be used to verify identity. Your driver\u2019s license or passport proves your identity by using a photograph that has been verified next to your name. This is also known as \u201csomething you are\u201d. Fingerprint identification is also a way of identifying an individual by something that they are.<\/p>\n<p>Finally, you can verify identity by \u201csomething that you have.\u201d Keys are based on this idea. By putting a key into a lock, you can verify that you are correctly allowed into a building because you have the proper key to the door. Like passwords, of course, keys can be given to someone else. Unlike passwords, they are more limited in their risk, due to the fact they physically exist.<\/p>\n<h2>Two factor authentication<\/h2>\n<p>All of these are the idea of \u201csingle factor authentication\u201d. In order to move towards a more secure verification process, many systems have begun implementing \u201ctwo factor authentication\u201d. As might seem obvious, this layers security by requiring two of these criteria rather than just one. Computer systems started implementing this with electronic tokens more than fifteen years ago, where a small token was issued to an individual user, which generated a number every 60 seconds according to a known algorithm. When combined with a password, we could ensure the user was who they say they are by not only the password \u2013 something they know \u2013 but also by the code on the token \u2013 something they have.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2839 alignright\" src=\"\/wp-content\/uploads\/blog\/maxiq\/2014\/08\/Two-Factor-Authentication-350x173.jpg\" alt=\"Two-Factor-Authentication\" width=\"350\" height=\"173\" data-entity-type=\"\" data-entity-uuid=\"\" \/>With the rise of smartphones, it has become much easier to place a token generator into the hands of users. Instead of requiring a new piece of hardware for every user, a device they already carry can be augmented to provide a token generator, and then provide that token when needed. When combined with a password, this two factor authentication is dramatically more secure than a password alone.<\/p>\n<p>This mechanism is so secure, many popular services have already implemented it. Microsoft, Google, Dropbox, Evernote, Yahoo, Facebook, Twitter, and many other have implemented this additional layer of security to help reduce compromised data and compromised accounts.<\/p>\n<h2>Layered security solution<\/h2>\n<p>MAX, and our\u00a0<a class=\"ext\" href=\"http:\/\/www.gfimax.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">MAX RemoteManagement platform<\/a>, have now launched two factor authentication into the dashboard. Because of the significant level of access that the MAX dashboard provides, allowing for complete remote administration of a MSP\u2019s customer\u2019s networks, this additional level of security can ensure an MSP is doing everything possible to protect the privacy of their customer\u2019s data. In my professional opinion, every MSP should enforce this policy on every login they issue to the MAX dashboard.<\/p>\n<p>Additionally, two factor authentication provides a level of opportunity for the MSP to deliver to their customer\u2019s additional value. Implemented in the MSP\u2019s own network and with their own systems, it can be used then as a demonstration of the power and ease of the security, and the MSP can then help implement two-factor authentication for the customer as well\u00a0as part of a layered security solution.<\/p>\n<p>Security is an ongoing investment. MSPs need to be ever-vigilant in helping their customers reduce risk, and implementing two-factor authentication is one more way that solution providers can add additional value to their customers, as well as protect their own organization from risk.<\/p>\n<h3>Don&#8217;t forget to share your thoughts below&#8230;comments are always welcome!<\/h3>\n","protected":false},"excerpt":{"rendered":"<p>Passwords are a security nightmare. Any system is only as secure as it\u2019s weakest link and the human element inherent in passwords makes them insecure. Most MSPs and Solution Providers&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6022","post","type-post","status-publish","format-standard","hentry","topic-msp-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Increase security with two-factor authentication - N-able<\/title>\n<meta name=\"description\" content=\"Find out how you can further protect your clients using two-factor authentication in our latest post from Dave Sobel!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Increase security with two-factor authentication - N-able\" \/>\n<meta property=\"og:description\" content=\"Find out how you can further protect your clients using two-factor authentication in our latest post from Dave Sobel!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-29T20:38:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T13:49:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Increase security with two-factor authentication\",\"datePublished\":\"2014-08-29T21:38:40+01:00\",\"dateModified\":\"2021-07-12T13:49:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication\"},\"wordCount\":652,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"MSP Business\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication\",\"name\":\"Increase security with two-factor authentication - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2014-08-29T21:38:40+01:00\",\"dateModified\":\"2021-07-12T13:49:25+00:00\",\"description\":\"Find out how you can further protect your clients using two-factor authentication in our latest post from Dave Sobel!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"MSP Business\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/msp-business\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Increase security with two-factor authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Increase security with two-factor authentication - N-able","description":"Find out how you can further protect your clients using two-factor authentication in our latest post from Dave Sobel!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication","og_locale":"pt_BR","og_type":"article","og_title":"Increase security with two-factor authentication - N-able","og_description":"Find out how you can further protect your clients using two-factor authentication in our latest post from Dave Sobel!","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2014-08-29T20:38:40+00:00","article_modified_time":"2021-07-12T13:49:25+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Increase security with two-factor authentication","datePublished":"2014-08-29T21:38:40+01:00","dateModified":"2021-07-12T13:49:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication"},"wordCount":652,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["MSP Business"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication","url":"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication","name":"Increase security with two-factor authentication - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2014-08-29T21:38:40+01:00","dateModified":"2021-07-12T13:49:25+00:00","description":"Find out how you can further protect your clients using two-factor authentication in our latest post from Dave Sobel!","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/increase-security-two-factor-authentication#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"MSP Business","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/msp-business"},{"@type":"ListItem","position":2,"name":"Increase security with two-factor authentication"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/6022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=6022"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/6022\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=6022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}