Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Won’t More IT Security Just Slow Me Down?




Won’t More IT Security Just Slow Me Down?

When I was a kid, there was a Tex Avery cartoon where Droopy Dog was chasing down a crook who escaped from jail. There was a particular scene where the crook (I think it was a wolf in a black-and-white striped jumpsuit) takes a bus, a plane, a ship, and a taxi to a secluded cabin, and then closes a series of increasingly complex doors with a large number of locks, in order to hide away from the pursuing cartoon basset hound. 

Of course, when he turns around, exhausted by all the effort he puts in, he realizes that Droopy is standing right behind him, and greets him with a monotone “hello.”

I haven’t seen this cartoon since I was 7 years old, but I almost always think about it when I am using multi-factor authentication. 

Does Cybersecurity Feel Like It’s a Lot of Effort?

Strong complex passwords, multi-factor authentication, complex policies and rules, and not always feeling like you have total access to everything you need at any given time certainly can feel like a hurdle when it comes to getting stuff done.

Believe me, I get it. As a tech head, I love how secure my information can get, but as a business owner, as a person who just needs to get things done, it really can be just frustrating enough to make it feel like it isn’t worth it.

I’ll never stop advocating it though.

Sometimes, in my head, I might grumble and think to myself—this is stupid, I’m just trying to get into my Facebook account. But then I think, through my Facebook account, I have all of my contacts, many of which are people I do business with. I also own my business page, and a couple of groups that I rely on for networking, and my ads account, which has my business credit card…

You get the idea. It’s just Facebook, but it’s so wrapped around my life that if someone else were to get in there, it could get really messy and complicated.

The same goes for email accounts, bank accounts, and software that stores sensitive information for myself and my business. Basically, anything that you can lock down with multi-factor authentication, you really should, and your employees should all be doing the same.

The Password Just Isn’t as Secure as It Used to Be

Somewhere early on, when the world was figuring out what to do with computers and the Internet, a bunch of folks got together and decided that the password would be the ultimate authentication tool. You just type in your magic words, “open sesame!” and yep, that’s definitely you and can’t possibly be anyone else!

It wasn’t a bad idea back before we were doing banking and storing medical records and other sensitive information online, and before we were using online tools and databases to store tons and tons of client information about people besides just ourselves.

But the password just isn’t that secure. They are easy to crack, and it’s so easy to be lazy about them to the point where they don’t even offer any protection at all. A 12-character password can be cracked with password-cracking software on your average laptop in less than 14 hours, and that time could be much shorter if your password isn’t all that complex.

Plus everyone has the tendency to reuse passwords or establish a predictable pattern in their password-making behaviors… it’s a mess. It’s not a good way to rely on security.

That’s why we have things like multi-factor authentication. Yes, it adds an extra step and can be a little annoying, but it can be streamlined. Here are some tips.

How to Optimize Your Multi-Factor Authentication

  • Try to stick to just one single authentication app, preferably one that can be backed up and synced between devices. Give us a call at (604) 513-9428 to help you pick one that works for you.
  • Label your accounts in the app clearly, and try to organize them if you can.
  • In your password manager, note how the multi-factor authentication works. If it has to come through SMS or email, it might feel a little more efficient if you noted that for yourself so you were prepared as you were logging in.
  • Go into current accounts and check to see what your security settings allow you to do. When possible, use the authentication app so you aren’t relying on authentication information coming in from all different directions.

Cybersecurity is complicated, and it can feel like an overwhelming hurdle, but we can help you and your business use it effectively. It is important, and it is something that we should all be using as often as possible.

To get help, give us a call at (604) 513-9428.

Continue reading

How to Get Back Into Your Multi-Factor Authentication Account




How to Get Back Into Your Multi-Factor Authentication Account

Multi-factor authentication is great when it works, but when it doesn’t, it can leave you in a pretty difficult situation. After all, what happens when all of a sudden, you cannot access your secondary authentication methods? We’re here to help you bypass this particularly challenging and frustrating scenario.

First, let’s look at how and why you might accidentally get locked out of your MFA methods.

How Might You Get Locked Out of Your MFA Solution?

Multi-factor authentication works by shoring up the problematic password and augmenting it with other, secondary methods of authentication that are more secure. The logic is simple; two keys for a single lock is more effective than one. You might use a password and a fingerprint scan, or a password and a USB key. Here is a brief rundown of various MFA methods:

  • Something you know: A password, passphrase, or a PIN.
  • Something you have: Something you own or have in your possession is required to access the account, like a key card, smartphone, or hardware-based security key.
  • Something you are: Think biometrics, a fingerprint, or retina scan—something to confirm your identity.

By requiring more than just one form of authentication, it becomes much more difficult for an attacker to get into an account.

Of course, requiring two keys also means that if you lose one of them or forget one of them, you cannot access your account, leading to the exact opposite problem of hackers infiltrating your account.

Potential Solutions to Your Dilemma

Rather than give up immediately and start over, let’s consider two paths you might be able to use to gain access to your locked account.

You might be logged in elsewhere.
Most services and applications using MFA will have a website and an app, and chances are at least one of them will still have you logged in, if you’re like most individuals who dislike the hassle of logging into your account every time you have to use it. You can sometimes check the settings to discover an option that will let you temporarily disable two-factor authentication. You will probably have to provide the password, so make sure you don’t accidentally log out until you have finally gotten control of your account again.

Customer support might help.
Customer support might not be the most ideal solution to your problems, but it’s an effective one. Simply put, you never know what’s possible until you ask about what is possible. There might be a simple way you can get back into your account. If there isn’t, there might still be a way too, but it could take up to a couple of days before it takes effect.

Really, the best way to address this issue is to not find yourself in it in the first place. If you have to open a new account just to get around this frustration, make sure you contact the vendor to disable the old account so that no one can take advantage of the old one.

What Other Options Do You Have?

Most modern MFA tools have contingency plans built into them specifically for situations like these. One way is to set up multiple methods of secondary authentication, like having secondary phone numbers, email addresses, or biometrics in place, providing you with more ways to get into your account should you lose access to one of them.

Many MFA platforms also provide users with recovery keys or backup codes that you can use to communicate with the MFA platform, further guaranteeing that you are the designated user. If you generate one of these codes, you’ll want to ensure that it is protected in a safe place, preferably one with encryption.

If you go the security key route, you should consider getting a second key as well, just in case. Some services enable you to get multiple keys tied to your account specifically because they understand how easy it is to lose something important like this. Plus, if you ever upgrade your key, you’ll have the old one to use as a backup.

Let’s Make Sure Your IT Works

One of our big responsibilities as a managed service provider is making sure you get the value you expect out of your technology, which includes accessing your resources and accounts as needed. We can help you ensure that you are always connected to what makes your business run. To learn more, reach out to us at (604) 513-9428.

Continue reading

MFA is Becoming a Major Component of Business Insurance




MFA is Becoming a Major Component of Business Insurance

Businesses are prioritizing cybersecurity more than ever. Many insurers now require companies to meet specific cybersecurity standards before offering coverage, with one key requirement being the implementation of multi-factor authentication (MFA).

Here’s what you need to know and how we can help.

What is MFA?

Multi-factor authentication (MFA) is a cybersecurity measure that adds additional layers of security beyond the traditional username and password system.

While the classic username and password combination has been a standard since the advent of networking, it is relatively easy for cybercriminals to compromise using methods like phishing, keylogging, and network snooping.

MFA mitigates these risks by requiring additional authentication steps that are much harder to replicate or steal.

How Does Multi-Factor Authentication Work?

MFA enhances security by requiring users to provide extra proof of identity.

Initially, a user presents their identity with a username, requesting access. Traditionally, this identity was authenticated with a password. However, MFA requires more proof before granting access, such as an additional authentication factor.

What Can Be Used as Authentication in Modern MFA Systems?

Modern MFA systems require additional proof of identity, which can be categorized into three types:

  • Something you know: A password or passcode.
  • Something you have: An access token, account, or application.
  • Something you are: Biometric data.

While some options are more secure than others, any MFA implementation significantly enhances security, which is crucial for insuring your business.

Emailed Codes

This method involves sending a code to the user’s email during an access attempt. The user must then provide this code to gain access. It’s simple but effective for businesses willing to check their email before logging into a secured resource.

SMS Codes

Some platforms send a code via text to the user’s phone, which must be entered to gain access. Despite its simplicity, SMS-based MFA has some downsides, such as issues if the phone is lost, upgraded, or if the phone number changes.

Authentication Applications

Dedicated MFA applications like Google Authenticator, Microsoft Authenticator, and Duo offer a secure way to generate and access MFA codes. When choosing an app, ensure it supports device transfers and backups.

We’re Here to Help

Business insurance is essential, and if it helps make businesses more secure, it's a win-win. If you want to learn more about implementing MFA or have any other IT or cybersecurity questions, we’re here to help. Call us at (604) 513-9428 to learn more.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

20178 96 Ave C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am–5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image