Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Your Phone Can Work as Your Security Key

Tip of the Week: Your Phone Can Work as Your Security Key

If you’re like most people nowadays, your mobile phone is currently well within your reach (and that’s assuming you aren’t reading this blog on it). The fact that most people keep their phone on them at all times has greatly contributed to these devices becoming a part of any given work-related process. One major way is the implementation of two-factor authentication, which we’ll discuss as a part of this week’s tip.

As we begin, it is important that we acknowledge that the Android operating system has been granted FIDO2 certification. In other words, the FIDO (Fast IDentity Online) Alliance has given the Android OS their seal of approval in regard to the authentication standards that the Alliance has set.

What Does This Mean?

In very simple terms, any Android device running 7.0 or higher with the latest Google Chrome update installed can be used as part of a two-factor authentication strategy - more specifically, as a security key. This includes the support that FIDO2 offers for onboard fingerprint scanners as a means of identity authentication. Currently, this authentication standard is only supported by Android, with no indication of Apple devices incorporating it.

In no uncertain terms, this all means that passwords may soon be phased out.

Abandoning Passwords

Passwords have been the standardized form of authenticating one’s identity for quite some time, despite the potential issues that are present with them. How often have we seen just how many ways a determined cybercriminal has to obtain a password? Between insecure databases filled with credentials and unfortunately successful phishing schemes, millions of accounts have been exposed - and that isn’t even taking all the times an insecure password was guessed into account.

The biggest weakness that any password has is the fact that it can be shared at all, that someone other than the owner can use it. Over any other reason, this is why FIDO2 is likely to become as popular as it is expected to be. When was the last time you successfully shared a thumbprint with someone, after all? Furthermore, FIDO2 keeps all of the information that is pulled from its biometrics onboard the device, keeping it safe from being stolen on the Internet.

As an added bonus, FIDO2 won’t allow the user to input their fingerprint’s biometric data into websites that don’t have sufficient security measures in place.

How to Use Your Android Device as a FIDO2 Security Key

In order to leverage your Android device as a security key, you need to make sure that it meets a few benchmarks. First and foremost, you’ll need to be running at least Android 7.0, with the latest version of Chrome installed. You will also need to have Bluetooth activated, and a Google account with two-step verification enabled.

This is somewhat simple to do. Logging into your Google account, access the Security section. Here, you’ll find the option to activate 2-Step Verification. After a short process, your smartphone will work as a security key.

Authenticating Google Sign-Ins with Your Phone

As long as you have enabled both Bluetooth and Location on your mobile device, any Google service you try to access will prompt you to confirm the sign-in attempt via your phone. This process is exceptionally simple - all you have to do is press Yes on your phone and wait. Once you’ve done so, you can confidently access your Google account, securely. As more developers adopt FIDO2, this enhanced security will only appear more often.

What do you think of this new authentication method? Share your impressions in the comments! While you’re there, let us know if there are any other tips you’d like us to cover!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Server Save Money Data Recovery Passwords Windows 10 Gadgets Chrome Virtualization Tech Term Saving Money Social Media Holiday Managed Service Automation Managed IT Services Microsoft Office Artificial Intelligence Computers Facebook Cybercrime Operating System Wi-Fi BYOD Mobile Device Management Networking Health IT Support Internet of Things Hacking Spam Remote Alert Information Office 365 Telephone Systems Covid-19 Information Technology Managed Service Provider Bandwidth Recovery Employer-Employee Relationship Router BDR Social Engineering Mobility Remote Monitoring Password Mobile Computing Money App History Encryption Application Applications Data Breach Human Resources Law Enforcement Big Data How To Managed IT Apps Office Tips Data Storage Patch Management Training VPN Government Remote Computing Blockchain Private Cloud Paperless Office Mobile Office Flexibility Bring Your Own Device Data Management Marketing Work/Life Balance Infrastructure Voice over Internet Protocol WiFi IT solutions Wireless Entertainment Vulnerability Website Budget Windows 7 Word Gmail Google Drive Settings Servers Two-factor Authentication Avoiding Downtime Data Security Mouse HaaS User Error Save Time Machine Learning Meetings Connectivity Remote Work Cleaning Vendor Risk Management Hacker Managed Services Display Conferencing End of Support The Internet of Things Lithium-ion battery Scam USB Education Physical Security Safety Employee/Employer Relationship Data Protection HIPAA Sports RMM Redundancy Firewall Keyboard Vendor Management Virtual Reality Apple Social Software as a Service Telephone System Staff Net Neutrality Workplace Strategy Virus Value Help Desk Update Data storage Printing Spam Blocking Electronic Medical Records Wearable Technology Automobile Unified Threat Management Computer Accessories Retail Hard Drives Google Docs Instant Messaging Robot Computing Infrastructure Excel Hiring/Firing Identity Theft Managed Services Provider Going Green Biometrics Virtual Desktop Database Printer Bluetooth Battery Augmented Reality Remote Workers Shadow IT Fraud DDoS Legal Business Intelligence Processor SharePoint Remote Worker Audit Internet Exlporer Worker IT Management Cryptocurrency Hard Drive IT Consultant Botnet Customer Service PDF IT Plan Environment Comparison Humor Computing Fax Server Proactive IT Unsupported Software CES Best Practice SaaS YouTube Charger Business Technology Black Market Content Management Access Control Digital Signage Compliance OneNote Computer Care Network Congestion Virtual Assistant Current Events Authentication eWaste Document Management Telephony Solid State Drive Wireless Technology Samsung How to Procurement Downtime Social Network Files Nanotechnology Telecommuting Skype Project Management Shortcut Data loss Investment Chromecast Cortana Troubleshooting User PowerPoint Employees Outlook Windows Media Player Employee/Employer Relationships Cost Management Leadership Digital Signature Social Networking Colocation ISP Uninterrupted Power Supply Windows 365 Start Menu Warranty Video Conferencing Screen Mirroring HVAC ROI Loyalty Google Apps Shortcuts Books Managing Stress Sales Frequently Asked Questions Bitcoin Monitor Analysis Personal Windows 10s Devices Cryptomining Point of Sale Running Cable Mobile Administrator Cameras Supply Chain Management Cast Enterprise Content Management Memory Streaming Media Emergency Monitoring Tip of the week MSP Batteries Reputation webinar Accountants Digitize Public Cloud Thought Leadership Tech Support Employer Employee Relationship Credit Cards Windows 8.1 Content Professional Services Microchip Techology Password Management Windows Server 2008 R2 Laptop Assessment Password Manager Multi-Factor Security Customer relationships Windows Server 2008 Customers IT Assessment Twitter Manufacturing Science Email Best Practices Audiobook Tools Search Engine Printer Server NIST Touchpad Television Business Mangement Security Cameras Trending Computer Tips Managed IT Service Smart Tech OneDrive Customer Relationship Management Advertising Addiction Biometric Security Amazon Virtual CIO Distributed Denial of Service Politics Peripheral Analyitcs Public Computer Recycling Notifications Transportation Digital Security Cameras Regulations Wiring Using Data Programming Practices Copiers Computer Fan Cache 5G Rootkit Amazon Web Services Quick Tip Safe Mode Criminal Relocation Workers Hosted Computing Smartwatch Benefits Ergonomics Antivirus GDPR Development FENG Wireless Internet OLED Windows 8 Online Shopping PCI DSS IT service Video Games File Sharing Virtual Machine IBM Fiber Optics Inventory Employee Smart Technology Specifications 2FA Worker Commute Flash Camera Experience Messaging Wire Cabling Tablet Evernote Consultant Travel Analytics Policy Domains Scalability Software Tips Hypervisor Supercomputer Trend Micro Emails Millennials Dark mode Business Owner Sync Printers IaaS SMS Maintenance Smart Office Default App NarrowBand Wireless Charging Best Available WIndows 7 Procedure Search Saving Time Bloatware Shopping iPhone Netflix Google Search Two Factor Authentication Workforce dark theme Virtual Private Network AI Root Cause Analysis IT Infrastructure Tablets Cables Bing Music FinTech HBO Entrepreneur Knowledge

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code