There's good reason why Two-factor Authentication is a mainstream security technology.Umair
Two-factor authentication is a security measure that needs two different ways of proving your identity. This security method is utilized by most service providers and is very common. It simply adds an additional layer of security to your existing security measures by ensuring the identity of the user. This makes it an ideal method for solutions utilized for backup such as cloud backup.
This security measure can also be used with public cloud service providers. Most of them already provide the option like Google, Dropbox, One drive etc. You can also implement this security measure with your backup appliance.
Consider making a payment with your credit card. You simply cannot do so with just your card, you either have to provide a PIN or signature or an ID. That’s an example of 2FA. There can be a number of two-authentication factors; some of them are as follows:
• Information based: A password or the answer to a security question.
• Entity Based: A security code or an ATM card.
• Identifiable feature based: Biometric data such as fingerprints.
More examples of 2FA include drawing money using an ATM card (Card + PIN) or entering a foreign country (Passport + Biometric Data).
Imagine someone managed to hack into your email account. What’d you think they gain access to?
Most probably, every social media account including facebook, twitter, tumblr; maybe even whatsapp and other messengers too and all other accounts affiliated with these accounts. And, if your email is linked to your enterprise cloud storage then all that data is leaked as well. If that data has sensitive credentials, then all of that is getting sold to the highest bidder. Within mere moments, you’re going to be enduring a loss of reputation, data loss and financial losses as well. That’s a horrible picture to imagine.
That’s why you should acquire two-factor authentication to ensure that it doesn’t happen to you.
And you should definitely use the security measure for your backup appliances because a breach in those can translate to data loss and leakage. You should also use the security measure for any and all backup clouds that you’re employing to prevent malicious access.