{"type":"document","data":{"id":"afb9aa9f-452b-4cb0-88b6-605e3a4d03aa","localeString":"en-GB","publishDate":"2024-02-16T14:39:46.117+01:00","contentType":"onecms:editorialPage","hasMacro":false,"flexPageMetadata":{"afmBanner":false,"robotInstruction":{"noIndex":false,"noFollow":false},"description":"Protect your online accounts with strong passwords and 2FA"},"mainHeaderZone":{"componentType":"editorialHeader","coreHeader":{"title":"The importance of passwords and two-factor authentication for SMEs","body":"Passwords are every company's first line of defense against cyber-attacks. However, weak or poorly chosen passwords can be easily compromised by cyber criminals. Two-factor authentication (2FA) is an additional security measure that adds a layer of protection to your online accounts."},"backLink":{"textLink":{"url":"/en/business/news/secure-business","text":"Secure business"}},"date":"2023-08-14","readingTime":5},"flexZone":{"flexComponents":[{"componentType":"paragraph","richBody":{"value":"<p></p>"},"alignedImage":{"position":"top","transformBaseUrl":"https://assets.ing.com/transform/623d414b-807b-4609-81f9-f37216e5c7ac/Full-frame-shot-of-white-background","altTextEN":"\"\"","altTextNL":"\"\"","altTextFR":"\"\"","altTextDE":"\"\"","original":"https://assets.ing.com/m/d4ed420f54697/original/Full-frame-shot-of-white-background.jpg","extension":"jpg"}},{"componentType":"sectionTitle","title":"What is two-factor authentication?"},{"componentType":"paragraph","richBody":{"value":"<p>Two-factor authentication (2FA) is an authentication method that requires two different factors to access an account. The first factor is usually a password, and the second factor can be a code sent by SMS or an application on a mobile phone, a fingerprint or an iris scan. </p>"}},{"componentType":"sectionTitle","title":"How do cyber criminals crack passwords?"},{"componentType":"paragraph","richBody":{"value":"<p>Cyber criminals use a variety of methods to steal passwords, including: </p><ul><li><p><strong>Phishing attacks</strong>: cyber criminals send fraudulent emails that appear to come from reliable sources. These emails contain links to a login page for a tool used in the company (Microsoft Office, Google Docs or other) where the employee enters their password and shares it with the hackers. </p></li><li><p><strong>Brute force attacks</strong>: cyber criminals use software that tries to guess victims&apos; passwords. These programs can try millions of combinations per second, enabling them to crack weak or poorly chosen passwords in a matter of minutes. </p></li><li><p><strong>Stolen password databases</strong>: cyber criminals sell databases of stolen passwords on the dark web. These databases contain the usernames, email addresses and passwords of millions of people. Cyber criminals can then use this information to access victims&apos; accounts. They can also count on the fact that many people re-use their passwords on many platforms and sometimes even at work. </p></li></ul>"}},{"componentType":"sectionTitle","title":"Why is two-factor authentication important?"},{"componentType":"paragraph","richBody":{"value":"<p>Two-factor authentication (2FA) is an additional security measure that adds a layer of protection to your online accounts. Even if your password is compromised, cyber criminals will not be able to access your account without the second factor. </p>"}},{"componentType":"sectionTitle","title":"How can these security measures be put in place?"},{"componentType":"paragraph","richBody":{"value":"<ul><li><p><strong>Establish solid password rules</strong>: Passwords must be at least 14 characters long, including upper- and lower-case letters, numbers and special characters. Encourage employees to use password managers to generate and store their credentials securely. </p></li><li><p><strong>Implement two-factor authentication (2FA)</strong>: Choose a two-factor authentication method suited to your business, such as an authentication application or sending of codes by SMS. Make sure that all employees activate this functionality for all sensitive accounts. </p></li></ul><ul><li><p><strong>Raise awareness and train your employees</strong>: Organise online security awareness sessions and provide practical advice on creating strong passwords, identifying phishing attempts and using two-factor authentication. Encourage a culture of online security within your company. </p></li></ul>"}},{"componentType":"highlight","richBody":{"value":"<p>Passwords and two-factor authentication (2FA) are important security measures that can help protect your business against cyber-attacks. By combining strong passwords and two-factor authentication, you can make your online accounts much more secure. </p><p>You can find out more about security for your business at safeonweb@work.  </p>"}}]},"complementaryZone":{"flexComponents":[{"componentType":"sectionTitle","title":"Also interesting !"},{"componentType":"cards","cards":[{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"LinkedIn","body":"Secure your account","image":{"transformBaseUrl":"https://assets.ing.com/transform/e61c1879-97a6-4ba1-93b8-ac16fe39363b/secure-linkedin-1920","type":"image","width":1920,"original":"https://assets.ing.com/m/344433bf4ceedbc2/original/secure-linkedin-1920.jpg","extension":"jpg"},"date":"2023-05-24","link":{"url":"/en/business/news/secure-business/protect-your-linkedin"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Sending and receiving e-mails","body":"Tips to protect yourself","image":{"transformBaseUrl":"https://assets.ing.com/transform/b2dddaa8-f1e7-4a08-b216-205c3679c8c7/write-emails-1920","type":"image","width":1920,"original":"https://assets.ing.com/m/1b7765cf946c956/original/write-emails-1920.jpg","extension":"jpg"},"date":"2023-05-24","link":{"url":"/en/business/news/secure-business/email-and-security"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Using the cloud","body":"12-04-2021","image":{"transformBaseUrl":"https://assets.ing.com/transform/43cf07b6-ae94-4c43-b4e7-0b12620a0f48/using-the-cloud-safely-1920","type":"image","width":1920,"original":"https://assets.ing.com/m/373081f25c0ab2b0/original/using-the-cloud-safely-1920.jpg","extension":"jpg"},"date":"2021-04-12","link":{"url":"/en/business/news/secure-business/cloud-and-security"}}]}]}}}