Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Are You Securing Your Data Enough With Encryption and 2FA?
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Are You Securing Your Data Enough With Encryption and 2FA?
Security

Are You Securing Your Data Enough With Encryption and 2FA?

Anand
Anand
5 Min Read
SHARE

There are two strategies that are regarded fool-proof when it comes to data security – encryption and two-factor-authentication (2FA). The idea is that when all the data that is transmitted between servers is replaced with cipher text, hackers would fail to interpret them even if they were able to hack into it. Also, when a user’s access into a system is tied to a physical asset like mobile phone, there is no way a hacker who does not have access to this device would be able to break in.

There are two strategies that are regarded fool-proof when it comes to data security – encryption and two-factor-authentication (2FA). The idea is that when all the data that is transmitted between servers is replaced with cipher text, hackers would fail to interpret them even if they were able to hack into it. Also, when a user’s access into a system is tied to a physical asset like mobile phone, there is no way a hacker who does not have access to this device would be able to break in.

While this continues to be the popular opinion among security analysts, some researchers have started wondering if the encryption and 2FA technologies deployed by many enterprises today is all but a security theater – a means to demonstrate improved security while not adding enough to actually make the system secure.

More Read

data security for software companies
Supply Chain Tips for Software Companies to Avoid Data Breaches
Michigan Cyber Initiative Reports ‘People’ as Weakest Link in IT Security
Your Business’ Network Needs IPS and IDS – Here’s Why
10 Tips to Fight Against AI-Driven Ransomware Attacks
Cyber Security: How to Cover Your SaaS

A recent report by PT Security showed that One-Time-Passwords used to authenticate user accounts on WhatsApp and Telegram are not effective since these codes are rendered over mobile communication systems which are not secure. The researchers here were able to hack into a message sent by Telegram to obtain the OTP. In short, the aura of additional security due to encrypted data transmission and 2FA was rendered ineffective because the channels used to carry out the authentication itself was insecure.

In another report prepared by the US National Institute of Standards and Technology (NIST), SMS based two factor authenticated was declared insecure since there are multiple scenarios where an SMS sent to a user’s phone could be accessed by a third party. Most software agencies follow NIST guidelines in their appliances and the latest report is being seen as the beginning of the end for SMS 2FA.

Despite these loopholes, encryption and two-factor-authentication remain two of our best bets against data theft. 2FA helps secure the end-points of a pipeline while encryption seals the pipe itself. Together, when executed correctly, 2FA and advanced encryption help seal data from hackers. Even if SMS 2FA may appear to have its set of vulnerabilities, there are alternate methods to two-factor authenticate a system through secondary login, key, biometrics, etc. Depending on the nature of data being secured, businesses may choose from any of the several secondary authentication channels.

As prominent American cryptographer Bruce Schneier puts it, data encryption is only as strong as the algorithm used. The algorithm itself is like a password and it can be broken into using brute force. In effect, a persistent enough system can break into an algorithm if provided with sufficient resources. One solution that has been universally accepted today is the AES which is also known as Rijndael, a block cipher algorithm that has been adopted as a standard by the US government.

There is nothing called fool-proof security and the fight between hackers and security researchers is always going to be a cat-mouse game. However, as enterprises, it is important to adopt the latest standards and techniques in security which are far more likely to keep your data safe. At the moment, it happens to be AES and non-SMS based 2FA and this is where your investments should go.

Share This Article
Facebook Pinterest LinkedIn
Share
ByAnand
Follow:
Anand Srinivasan is the founder of Hubbion, a suite of business apps. The Hubbion Project Management app was ranked among the top 20 in its category for 2017 by Capterra.

Follow us on Facebook

Latest News

NO-CODE
Breaking down SPARC Emulation Technology: Zero Code Re-write
Exclusive News Software
online business using analytics
Why Some Businesses Seem to Win Online Without Ever Feeling Like They Are Trying
Exclusive News
edi compliance with AI
AI Is Transforming EDI Compliance Services
Exclusive News
companies using big data
5 Industries Driving Big Data Technology Growth
Big Data Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Calling All Federal Cybersecurity Practitioners: Contribute ideas and actions to enhance the community

4 Min Read
evolving cybersecurity standards for stopping data breaches
Big Data

Data Security Standards Are Evolving in Response to Rising Threats

7 Min Read
Image
Security

Malicious Tool Provides Attackers with a New Type of Zombies

7 Min Read
AI and big data
Artificial IntelligenceBig DataExclusiveITSecurity

Will Hackers Eventually Use Big Data and AI Against Us?

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?