It is time for pervasive Multifactor authentication

Passwords just do not work anymore to secure access to systems.  I think we are finally at a point where easy, cheap pervasive multifactor authentication is finally upon us.

Multifator (Multi Factor) authentication has been around forever to provide a higher level of security for accessing systems.  It means authenticating to a system with something you know (ID and password) and something you have like a token generator (provides a number you enter just in time) or digital certificate or even a device (computer, phone).  I think this whole concept evolved from the nuclear missile launch process where you need certain people with certain keys to get the missiles to go but I am sure there are examples from antiquity like having the kings seal or ring.  

The problem with it has been the expense of maintaining these solutions prohibited broad adoption expect in cases where it was needed (financial systems, ERP, etc).  Well it seems like this is another area where as a Service (aaS) is stepping up and making it easier to deploy better security at lower cost.  I have seen the Multifactor solutions where you are sent a pin to your phone for a few years and my bank authenticates the devices I connect to it from.  My favorite example is Amazon where I set this up and every transaction now requires me to include a security pin or access from an approved device.  The great enabler of this is everyone (well almost) carries a device capable of acting as a receiver of these tokens with them at all times.  Microsoft has made acquisitions in space and offer these services as part of Azure AD for enterprises to integrate this level of security in their apps.  There are many other solutions available.  

While I have not looked to deeply at it I am sure these solutions are not 100% perfect but they are way better and easier to deploy to improve the state of security to a effective level for the majority that I encourage all IT pros to start taking a look and advocating broadly deploying these solutions.

Please let me know your thoughts on this topic. 

To view or add a comment, sign in

More articles by Greg M.

  • Recent Malware incursions

    Well based on the news over the past few days with "Wannacry" it feels like we are back to the days of the early 2000's…

    3 Comments
  • What's going on with home users...

    Helping out family with their home technology problems is a professional hazard of working in IT. I thought I would…

    5 Comments
  • Are there untapped enterprise savings in Voice?

    Enterprises today spend a great deal of money on providing voice communications to their employees. They provide…

    4 Comments
  • My 2017 Tech Predictions

    It has been some time since my last post and with 2017 off and running and me just back from out of the country over…

    2 Comments
  • Is Device Innovation Dead?

    After the latest device announcements from Microsoft (Surface Studio) and Apple (Mac) I have decided that I miss Steve…

    3 Comments
  • The cloud offers the opportunity to think different..

    As I talk to organizations about cloud transformation the consistent theme is how do I support the agility that the…

  • At Microsoft what old is new again..

    So Microsoft is hip again. This is great for me who has hung my hat on transforming the world via Microsoft technology.

  • Best practices for Office 365 Tenant consolidation

    With all the M&A activity that has been going on over the past few years I am starting to see quite a bit more demand…

    1 Comment
  • Skills for the Cloud IT Professional

    I have been thinking lately how much of the work IT Pros needed to do as part of their job 5 years ago is rapidly going…

    3 Comments
  • Name Resolution needs resolution for a Cloudy Enterprise

    I think I deployed my first name resolution solution in an enterprise all the way back in the 1993-94. Over the years…

Others also viewed

Explore content categories