Calls for Instagram to add extra layer of security
In a step to better protect users and reduce fears related to online privacy, two-factor authentication (2FA) has now been employed by seven of the ten largest social networking sites (including Facebook, Twitter and LinkedIn) as their authentication measure of choice.
Public pressure has been a driving force for the trend, with hundreds of forum posts being posted to the most conspicuous absentee – Instagram’s – user boards and even the hashtag #SupportTwoFactorAuth being set up by consumer groups to help convince the social media behemoth to implement the technology.
“Using 2FA can help lower the number of cases of identity theft on the Internet, as well as phishing via email, because the criminal would need more than just the user’s name and password details, and often something the user themselves doesn’t know if your extra authentication layer should be a one-time passcode,” explains Steve Watts, co-founder of SecurEnvoy.
The use of the technology has become widespread in the consumer realm, with consumers well versed in how to use 2FA and the importance of it to keep their private data safe from prying eyes. For a decade or more we have been used to being issued with a card reader (in essence a hardware token device) to use with our bank card and Personal Identification Number (PIN) when looking to complete our internet banking transactions.
“2FA has become as ubiquitous as taking a selfie is for the modern masses, the information security technology being seen by many as the holy grail of authentication is literally already at the users’ fingertips,” adds Watts.
[su_box title=”Steve Watts, Co Founder of SecurEnvoy” style=”noise” box_color=”#336588″]Steve Watts is the Co-Founder and Sales & Marketing Director at SecurEnvoy plc. SecurEnvoy is the trusted global leader of mobile phone based Tokenless® two-factor authentication. Its innovative approach to the multi-factor authentication market now sees millions of users benefitting from its solutions all over the world. Controlling endpoints located across five continents, SecurEnvoy design innovative two step verification solutions that leverage both the device the user carries with them and their existing infrastructure. The solutions are the fastest to deploy and the most secure in the industry. With no hardware or deployment issues, the ROI is dramatically reduced and easily managed.With its channel centric approach, SecurEnvoy continues to expand its revenue and profitability year-on-year through its options to host on-premise, MSP or Cloud. SecurEnvoy has customers in government, healthcare, energy, financial services, insurance, manufacturing, marketing, retail, telecommunications, charity, legal, and construction sectors. Its integration partners include some of the world’s largest blue-chip organisations such as Juniper, AEP, Sophos, Citrix, Fortinet, Cisco, Checkpoint, Palo Alto, and Microsoft.[/su_box]
ISBuzz Team embodies the collaborative efforts of the dedicated staff at Information Security Buzz, converging a wide range of skills and viewpoints to present a unified, engaging voice in the information security realm. This entity isn't tied to a single individual; instead, it's a dynamic embodiment of a team diligently working behind the scenes to keep you updated and secure. When you read a post from ISBuzz Team, you're receiving the most relevant and actionable insights, curated and crafted by professionals tuned in to the pulse of the cybersecurity world. ISBuzz Team - your reliable compass in the fast-evolving landscape of information security
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.