Making sure you are up to date with the latest user permissions as well as two factor authentication is essential to protect against new cyber threats. The digital landscape is always changing, and cybercriminals are always one step ahead. To increase security, companies should deploy centralized solutions for access and user identification (IAM). These can be paired with improved education for users.

The most common method of deploying 2FA is to require users to use an authenticator application on their personal devices. This ensures that only the device of the user is used to log into HubSpot, reducing the risk associated with stolen or lost credentials.

For instance, Duo Security, a 2FA solution that was acquired by Cisco in the year 2018, provides mobile device support to its customers. The platform used by the company utilizes FIDO and Web Authentication API (WebAuthn) standards to provide mobile device verification by tapping into built-in capabilities in iOS, Android and Windows phones. This is a simple way for users of mobile devices to confirm their identity without having to rely on IT experts to update applications or alter settings. It also stops users from accidentally ignoring security controls.

Other methods to implement 2FA include requiring it to be enabled in specific geographic benefits of premium diagnostics locations, using network information to verify the location of users and blocking authentication attempts from suspicious networks such as Tor, proxies and VPNs. These conditional policies may also be configured and enforced via the IAM solution’s administrator dashboard.

It is also crucial to realize that the process of implementing and deploying 2FA will take some time. To help speed up the process, it is an ideal idea to utilize an IAM solution that allows users to self-remediate by disabling 2FA if their authenticator application is not functioning.