Page 8 - Catalog 2025 HTML Only
P. 8
2 Factor Authentication
GOOD: Network Defense Structure- 2 Factor Authentication
With increased Remote Access requirements, especially since the COVID situation, it makes the most
basic sense to have a way to veify that the person logging into your network is who they say they are and
doing that is now easy and cost-effective (as in free).
In our case, it makes perfect sense because as a Managed Services Provider, our Console is accessible to
all our techs from virtually anywhere. That Console also carries access to all our supported networks.
Additional layers of security protects our systems as well as yours.
So how does 2-Factor work?
When you enable 2-Step Verification (also known as two-factor authentication), you add an extra layer of
security to your account. You sign in to your Remote system and an access code is sent to your phone via
text or voice call. Any attempt to sign into your account will require 2-Step Verification.
We require our clients to implement 2-Factor as the small time spent doing a 2-Factor login can help you
prevent Ransomware and hacking compromises. Google Authenticator is available at no cost from the
Google App store. Microsoft and a numbr of others also have similar products out there. We can help
you set it up if needed.
Better:
Combine all the Good items listed above with an advanced Endpoint protection application and you have
Better. While Trend Micro does provide an excellent antivirus product, today’s network computing
environment continues to require a higher level of prevention. Trend Micro and all other standard
antivirus products generally respond to known viruses, Trojans and other known threats.

