k_Street Consulting, LLC Blog

Tip of the Week: Your Phone Can Work as Your Security Key

Tip of the Week: Your Phone Can Work as Your Security Key

If you’re like most people nowadays, your mobile phone is currently well within your reach (and that’s assuming you aren’t reading this blog on it). The fact that most people keep their phone on them at all times has greatly contributed to these devices becoming a part of any given work-related process. One major way is the implementation of two-factor authentication, which we’ll discuss as a part of this week’s tip.

As we begin, it is important that we acknowledge that the Android operating system has been granted FIDO2 certification. In other words, the FIDO (Fast IDentity Online) Alliance has given the Android OS their seal of approval in regard to the authentication standards that the Alliance has set.

What Does This Mean?

In very simple terms, any Android device running 7.0 or higher with the latest Google Chrome update installed can be used as part of a two-factor authentication strategy - more specifically, as a security key. This includes the support that FIDO2 offers for onboard fingerprint scanners as a means of identity authentication. Currently, this authentication standard is only supported by Android, with no indication of Apple devices incorporating it.

In no uncertain terms, this all means that passwords may soon be phased out.

Abandoning Passwords

Passwords have been the standardized form of authenticating one’s identity for quite some time, despite the potential issues that are present with them. How often have we seen just how many ways a determined cybercriminal has to obtain a password? Between insecure databases filled with credentials and unfortunately successful phishing schemes, millions of accounts have been exposed - and that isn’t even taking all the times an insecure password was guessed into account.

The biggest weakness that any password has is the fact that it can be shared at all, that someone other than the owner can use it. Over any other reason, this is why FIDO2 is likely to become as popular as it is expected to be. When was the last time you successfully shared a thumbprint with someone, after all? Furthermore, FIDO2 keeps all of the information that is pulled from its biometrics onboard the device, keeping it safe from being stolen on the Internet.

As an added bonus, FIDO2 won’t allow the user to input their fingerprint’s biometric data into websites that don’t have sufficient security measures in place.

How to Use Your Android Device as a FIDO2 Security Key

In order to leverage your Android device as a security key, you need to make sure that it meets a few benchmarks. First and foremost, you’ll need to be running at least Android 7.0, with the latest version of Chrome installed. You will also need to have Bluetooth activated, and a Google account with two-step verification enabled.

This is somewhat simple to do. Logging into your Google account, access the Security section. Here, you’ll find the option to activate 2-Step Verification. After a short process, your smartphone will work as a security key.

Authenticating Google Sign-Ins with Your Phone

As long as you have enabled both Bluetooth and Location on your mobile device, any Google service you try to access will prompt you to confirm the sign-in attempt via your phone. This process is exceptionally simple - all you have to do is press Yes on your phone and wait. Once you’ve done so, you can confidently access your Google account, securely. As more developers adopt FIDO2, this enhanced security will only appear more often.

What do you think of this new authentication method? Share your impressions in the comments! While you’re there, let us know if there are any other tips you’d like us to cover!

Virtual Reality has a Limitless Future
How to Mitigate Unhappy Online Opinions
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, June 25 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Backup Television Amazon Internet Monitor Cabling Camera Scam Education IT service Sports Voice over Internet Protocol HaaS webinar Data Warehousing Proactive Content Data Storage Users Smart Tech Information Retail HVAC Quick Tips Network Security Lithium-ion battery Google Drive Enterprise Content Management Product Reviews Fax Server MSP Wireless Charging Mobile Remote Monitoring Computing Infrastructure Save Time Google Apps Smartwatch CES Physical Security YouTube User Error Social Engineering Business Management Experience NIST Politics Bloatware Computer Repair Mobile Computing Outsourced IT Samsung Employer-Employee Relationship Virus E-Commerce Assessment Twitter Public Computer Laptop Uninterrupted Power Supply Shortcuts Workers Cloud Computing Environment IT Services DDoS Business Owner Business Continuity Upgrade Remote Maintenance Project Management Managed Service Provider OneNote Phishing Cables Servers Cast Mobility Network Congestion Battery LinkedIn Data Management HBO Programming Work/Life Balance Theft Risk Management App Manufacturing Botnet Online Currency Advertising Cache Display Internet Exlporer Virtual Desktop Operating Systems Domains Pain Points Net Neutrality Password Manager Hackers Document Management Root Cause Analysis Database Business Productivity Insurance Digital Signage Safe Mode Smart Technology Privacy Audiobook Fiber-Optic WIndows 7 Going Green Proactive Maintenance Printer Server ISP Troubleshooting Cameras Operating System Bring Your Own Device Company Culture Frequently Asked Questions File Sharing Conferencing Smartphones Flexibility Customer Relationship Management PowerPoint travel Google Docs 5G Amazon Web Services History Smartphone Safety Running Cable Humor IT Support Congratulations Outlook Tip of the Week Shadow IT Excel Employee Application Data Breach Proactive IT Computer Care Wireless Remote Computing Electronic Medical Records Audit Encryption Health Business Technology Music Meetings Millennials Google Business Mangement Data Recovery Analysis Cleaning Tech Term IT Management Credit Cards Cortana BDR Tablet Staff Data Backup Wi-Fi Internet exploMicrosoft Hacker Line of Business Authentication Augmented Reality File Versioning Distribution Instant Messaging Specifications IT Consultant Multi-Factor Security Digital Payment Firewall Information Technology Biometrics Public Cloud Hacking Money Machine Learning SharePoint User Tips Private Cloud Virtual Reality Content Management People Value Video Games malware Supercomputer Hybrid Cloud Windows Strategy Wearable Technology Computers Intranet Law Enforcement Business Intelligence Online Shopping eCommerce Hiring/Firing Help Desk Router Netflix Skype Employee/Employer Relationship Consultant Ransomware Customers Vendor Management Backup and Disaster Recovery Update Android Best Available FENG Hosted Solution Innovation Redundancy Scalability Logistics Windows 10 IBM Bing Leadership Phone System Mobile Device Management Computer Connectivity Best Practices SaaS Disaster Recovery Colocation Chrome Patch Management Analyitcs Tools Thought Leadership Remote Worker Remote Monitoring and Maintenance How To Printer Telephony IoT Knowledge Save Money Bluetooth Artificial Intelligence Workplace Tips User OLED Software Tips Flash Best Practice Facebook Virtualization Spam Blocking Password Managed IT Printers Analytic Hardware Current Events Devices Settings Microchip avoiding downtime IT Infrastructure Password Management USB Miscellaneous Cybersecurity Data loss Restore Data Criminal Tablets Nanotechnology Marketing Wiring Server Biometric Security Streaming Media Antivirus Productivity GDPR analytics Mobile Devices Touchscreen Security Unified Threat Management Tech Support Automobile Touchpad Legal Security Cameras Keyboard Internet of Things Search Engine VPN Digital Signature Big data NarrowBand Apps Emergency Evernote Students Google Search IT Plan Workforce Worker Commute Utility Computing Books Addiction Software as a Service Vulnerability Hring/Firing eWaste Cryptomining iphone IT Solutions Accountants Techology Notifications Thank You Small Business Trending Saving Money Virtual Assistant Maintenance Hard Drives Social Networking Customer Service Wireless Internet Managed IT Services Email Two Factor Authentication Tip of the week Data storage Spam Infrastructure Solid State Drive Holiday Networking IaaS Software Compliance BYOD Office Wireless Technology Business Computing Emails Cybercrime Vendor Recycling Alert Mouse Transportation Science Access Control Regulation Data Security Applications Electronic Health Records Robot Wire Webinar Warranty Administrator Windows Media Player Telephone System Entertainment Windows 10 Investment Statistics Managing Stress Windows 7 IT solutions Reputation Telecommuting Search Relocation Healthcare Budget Microsoft Content Filter Word CrashOverride Paperless Office Archive Computer Fan Storage Start Menu HIPAA Windows Server 2008 Apple Blockchain Passwords Gmail Worker Recovery Black Market Shortcut Entrepreneur Cost Management Hosted Solutions End of Support Human Resources Benefits Cryptocurrency Mobile Device Point of Sale Distributed Denial of Service Screen Mirroring Efficiency Cloud Content Filtering Technology Telephone Systems Unsupported Software Collaboration Saving Time Social Training ROI Office 365 WiFi VoIP communications Communication Smart Office Default App Rootkit Files Data Protection Gaming Console Remote Work Professional Services Virtual Private Network Sync Data Microsoft Office Windows 10s Office Tips Network Website Bandwidth Two-factor Authentication Practices Regulations Browser Automation The Internet of Things Multiple Versions Government Lifestyle Charger Chromecast Inventory Windows 8 Administration PDF Loyalty Memory Computer Accessories IT Support Employer Employee Relationship Downtime Social Media Fraud How to Gadgets Unified Communications Hosted Computing Managed Service Mobile Office Identity Theft Comparison Read Managed IT Services

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *