Multifactor Authentication (MFA): Better Safe Than Sorry!

Posted by Daniel Couture, NG Informatique 19-12-2019 10:22 AM

A misfortune like the one just suffered by Desjardins is not something any company would want or should have to endure. Unfortunately, the security gaps created by the adoption of new technologies, such as clouds or remote access servers, pose a greater risk than people realize, given the sensitive data that is stored there. The attacks are constantly firing and from all sides. Today, in terms of computer prevention, three important words to remember are: safety, safety and safety!

From Corbató to MFA
Recently, we learned about the death of Fernando Corbató, the first computer scientist to protect user accounts with passwords while working at MIT. Although its system was effective to protect the sensitive data of the time – we are talking here about the 60s –, computers have evolved greatly since then. The growing sophistication of data theft techniques is such that a password alone can not guarantee security. Is your computer protected with obsolete methods? It may be time to upgrade your system with authentication that uses at least two authentication methods, commonly called multi-factor authentication (MFA).

Why Protecting Data
Data leaks can have a major impact on the results and the image of your business. Studies tend to show that what exacerbates the problem of data leakage is inefficient security practices coupled with risky user behavior. Wi-Fi networks, connected tools, network printers, employees working on their personal computer... there are many doors for cybercriminals! Be proactive in implementing a strong authentication system.

The Winning Combination
Just as a password should contain numbers, uppercase letters, lowercase letters, and various other special characters, effective multifactor authentication also combines two or more of the following:


  • … known: password
  • … biometric: fingerprint, palm print, retinal scans
  • … that one has: cellphone, smart card, magnetic, etc.
  • … that one owns: handwritten signature, voice recognition, etc.
  • … geographical location: the place where one is

Better safe than...
Not a week goes by without hearing about a data leak in a company. Make sure it’s not yours! In computer science, as in many fields, it is better to be safe than sorry! Talk to your Millenium Micro representative today to start 2020 with peace of mind!