Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Are You Securing Your Data Enough With Encryption and 2FA?
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Are You Securing Your Data Enough With Encryption and 2FA?
Security

Are You Securing Your Data Enough With Encryption and 2FA?

Anand
Anand
5 Min Read
SHARE

There are two strategies that are regarded fool-proof when it comes to data security – encryption and two-factor-authentication (2FA). The idea is that when all the data that is transmitted between servers is replaced with cipher text, hackers would fail to interpret them even if they were able to hack into it. Also, when a user’s access into a system is tied to a physical asset like mobile phone, there is no way a hacker who does not have access to this device would be able to break in.

There are two strategies that are regarded fool-proof when it comes to data security – encryption and two-factor-authentication (2FA). The idea is that when all the data that is transmitted between servers is replaced with cipher text, hackers would fail to interpret them even if they were able to hack into it. Also, when a user’s access into a system is tied to a physical asset like mobile phone, there is no way a hacker who does not have access to this device would be able to break in.

While this continues to be the popular opinion among security analysts, some researchers have started wondering if the encryption and 2FA technologies deployed by many enterprises today is all but a security theater – a means to demonstrate improved security while not adding enough to actually make the system secure.

More Read

office data security
5 Ways to Minimize the Risks of Data Breaches in the Office
How Consumers Foot the Bill for Data Breaches
What Every Business Owner Needs to Know About Data Sovereignty
Bring Your Own Software
AI Can Manage Credit Card Cybersecurity Risks

A recent report by PT Security showed that One-Time-Passwords used to authenticate user accounts on WhatsApp and Telegram are not effective since these codes are rendered over mobile communication systems which are not secure. The researchers here were able to hack into a message sent by Telegram to obtain the OTP. In short, the aura of additional security due to encrypted data transmission and 2FA was rendered ineffective because the channels used to carry out the authentication itself was insecure.

In another report prepared by the US National Institute of Standards and Technology (NIST), SMS based two factor authenticated was declared insecure since there are multiple scenarios where an SMS sent to a user’s phone could be accessed by a third party. Most software agencies follow NIST guidelines in their appliances and the latest report is being seen as the beginning of the end for SMS 2FA.

Despite these loopholes, encryption and two-factor-authentication remain two of our best bets against data theft. 2FA helps secure the end-points of a pipeline while encryption seals the pipe itself. Together, when executed correctly, 2FA and advanced encryption help seal data from hackers. Even if SMS 2FA may appear to have its set of vulnerabilities, there are alternate methods to two-factor authenticate a system through secondary login, key, biometrics, etc. Depending on the nature of data being secured, businesses may choose from any of the several secondary authentication channels.

As prominent American cryptographer Bruce Schneier puts it, data encryption is only as strong as the algorithm used. The algorithm itself is like a password and it can be broken into using brute force. In effect, a persistent enough system can break into an algorithm if provided with sufficient resources. One solution that has been universally accepted today is the AES which is also known as Rijndael, a block cipher algorithm that has been adopted as a standard by the US government.

There is nothing called fool-proof security and the fight between hackers and security researchers is always going to be a cat-mouse game. However, as enterprises, it is important to adopt the latest standards and techniques in security which are far more likely to keep your data safe. At the moment, it happens to be AES and non-SMS based 2FA and this is where your investments should go.

Share This Article
Facebook Pinterest LinkedIn
Share
ByAnand
Follow:
Anand Srinivasan is the founder of Hubbion, a suite of business apps. The Hubbion Project Management app was ranked among the top 20 in its category for 2017 by Capterra.

Follow us on Facebook

Latest News

protecting patient data
How to Protect Psychotherapy Data in a Digital Practice
Big Data Exclusive Security
data analytics
How Data Analytics Can Help You Construct A Financial Weather Map
Analytics Exclusive Infographic
AI use in payment methods
AI Shows How Payment Delays Disrupt Your Business
Artificial Intelligence Exclusive Infographic
financial analytics
Financial Analytics Shows The Hidden Cost Of Not Switching Systems
Analytics Exclusive Infographic

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

AI and cybersecurity challenges
Artificial IntelligenceExclusiveITSecurity

How AI is Transforming Cybersecurity in 2021?

6 Min Read
7 Things about VPNs Every Businessman Should Know
Security

Is the IRS’s E-File Security Ready for Prime Time?

4 Min Read
privacy concerns over web based applications
Big DataExclusiveITPolicy and GovernancePrivacySecurity

Privacy Concerns Could Hinder Personalization of Web Based Applications

5 Min Read
AI and cybersecurity
Artificial Intelligence

AI Leads to Powerful New Fraud Detection Software for E-commerce

5 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive
data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?