SASKATCHEWAN RESEARCH COUNCIL
Once one site is compromised and your
password is exposed, hackers can start
using your login info at other sites.
WE ARE COMMITTED
TO SHAPING THE FUTURE
OF CONSTRUCTION
Through exceptional relationships and a deep
commitment to the success of our clients, colleagues
and communities. We know that when we focus on
mutual success, everyone wins.
Contact us:
Regina: 306-347-4200 | Saskatoon: 306-931-3322
PCL.COM
Something you “are”
!is one is primarily based on biometrics, such as a "ngerprint, retinal scan
or a voice print. For example, many mobile devices and applications allow
you to sign into your account with your "ngerprint.
Somewhere you are
!is is also known as “geofencing.” !is permits you to login (or not login)
when you are in a certain geographic region. For example, an application
that only allows you to login if you are located within a "ve-kilometer radius
of your place of business or house.
Let’s get into why two-factor authentication is so important.
Historical data shows us that hackers have breached some of the most
signi"cant cloud services and have gained access to millions of usernames
and passwords. Sometimes, these same usernames and passwords are used
at other sites by people like yourself, so it’s only a ma#er of time that one of
the hacked username/password combinations allows cyber criminals into
another application you have access to. (Remember: hackers have nothing
but time and use multiple computers to try username/password combinations
on various sites.)
Enabling two-factor authentication
Recently, cloud service providers have started to o$er two-factor authentication
(or in some cases multi-factor, which means more than one question
must be answered).
!is feature isn’t always turned on by default, so it must be enabled by
you, the “user” of the account. (Tip: Search in the service provider’s online
help for two-factor or multi-factor or search on the web to see how to set up
two-factor for your service provider.)
!e recommendation is to enable two-factor/multi-factor authentication
on all your personal accounts (e.g., email, bank, credit card, online
shopping). A%er your password (the "rst factor), then the second, third
and fourth factors (or more) are something the hacker will have a di&cult
time guessing or researching. For them, having only your login information
won’t be enough to break into your account. Hopefully, they’ll give up and
move on to the next person.
Two-factor and working remotely
In 2020, a large part of the workforce moved to a “working remotely” strategy.
In some cases, this may have presented an opportunity for hackers to
gain access to your corporate network. Guess what your "rst line of defense
is? Two-factor or multi-factor authentication! Make sure your business
has enabled two-factor/multi-factor authentication and if not, enable
it on your business account.
It takes a bit of extra work to use two/multi-factor authentication,
but it takes less time than recovering your online accounts (and life) if
you’re hacked.
many sites when you set up your account or enable two/multi-factor authentication.
You chose the question and provide the answer.
!e questions available to you are usually ones that hackers can’t research
to "nd the answer – so you will not see “what is your birthdate?” !e
questions are along the lines of where was your mom born? Where did you
parents meet? What was the name of your "rst pet? Although it’s tempting
to select a question that has an easy answer, keep in mind the easier it is for
you, the easier it might be for a hacker to "nd, too.
Something you “have”
!is one is typically based on a code that you must enter a%er your password
is accepted. !ere are cell phone applications and tokens (small devices
that generate the code) that generate a code that you can enter a%er
your password is accepted.
!ere are also services that can send a text or call your cell phone with a
code you enter in order to access your account or in the case of a phone call,
press a number to permit your login.
48 Think BIG | Quarter 2 2021 | saskheavy.ca
/PCL.COM
/saskheavy.ca
/PCL.COM
/saskheavy.ca