Once just a gimmick in high-tech spy movies, fingerprint scanning technology is now a common feature of smartphone security. Most modern smartphones give users the option to use their fingerprint as a method to unlock their phone, a considerably more convenient option than memorizing passcodes or swipe patterns. However, as is usually the case with security, the most advanced or convenient option isn’t always the safest.
Case in point: not long after the introduction of fingerprint scanning in consumer-level technology, a woman was ordered by the court to provide her fingerprint to unlock a smartphone. This highlights the fundamental difference between what you know and what you are. Under the Constitution, a defendant can refuse to testify against themselves, which is why someone wouldn’t have to give up your phone’s passcode even if you were ordered to do so. However, a biometric (e.g. a fingerprint or thumbprint) does not legally qualify as something that you know, but rather, it’s what you are. Therefore, the court can compel you to provide your biometric.
While there have only been a few cases in which an individual has been compelled to provide their biometric, the precedent is set; just because a security measure seems innovative and advanced, doesn’t mean it’s going to be all that secure. That’s why it’s important for your clients to ensure that they and their employees are applying truly reliable security measures with any devices they use for business each day – security measures like Multi-Factor Authentication.
Multi-Factor Authentication is the new standard for digital security, enforcing a strict security policy right at the time of access, as compared to other forms that require the installation of agents. When a user attempts to login in using their username and password, they receive a push notification on a separate device to confirm the action. In plainer terms, Multi-Factor Authentication ensures that only users with both the security credentials (username and password) and well as an independent additional device (such as a smartphone) that corresponds to those credentials will be able to access the account.
CloudJumper is proud to provide Multi-Factor Authentication as an add-on for our Workspace as a Service (WaaS) solution nWorkSpace, via cybersecurity industry leaders Duo. This solution allows your clients to add that extra layer of security to their business’ WaaS platform, ensuring only the right people can access their work
So what are the benefits of our Multi-Factor Authentication solution?
How does the nWorkSpace Multi-Factor Authentication solution work?
Multi-Factor Authentication is just one facet of the security that the CloudJumper team is proud to offer you and your clients. We understand how important security is in the modern business world, with new threats cropping up on a nearly daily basis – that’s why it’s so important for your clients to have comprehensive protection at their place of business, both in order to protect their vital assets, as well as give them peace of mind. From our data center security measures (managed firewall, antivirus, antispam measures, onsite security personnel) to the way we keep our end users safe from threats like Wanna Cry to basic solutions like Multi-Factor Authentication, we provide cloud security that you and your clients can really rely on.
Our team of IT experts will keep your IT security in line with modern technology trends. Learn more by getting in touch with the CloudJumper team right away at email@example.com or (844) 645-6789. Follow us on social media: Twitter | Facebook | LinkedIn
Take your clients’ workspace to the cloud with more access to hosted applications, multiple levels of security, ongoing support, and much more.
Virtualizing your software application saves your customers time and money. Cloud Jumper works with you to develop a hosted solutions for your application that is very lucrative and very much in demand by your customers.