• Skip to main content

1300 004 566

Help Centre

1300 004 566

Help Centre

brokerready_logo
  • home
  • about us
  • our services
    • backup as a service
    • CIO as a service
    • disaster recovery
    • it platforms
    • workstation management
  • how to guides
  • blog
  • contact us
  • home
  • about us
  • our services
    • backup as a service
    • CIO as a service
    • disaster recovery
    • it platforms
    • workstation management
  • how to guides
  • blog
  • contact us

Mitigating Cyber Threats – Use multi-factor authentication where ever possible

July 27, 2021 by Josh Barton

Author: Terry Barton | Date published: 27 July 2021

On June 19 2020, the ACSC published an advisory detailing various techniques that do a great job of mitigating cyber threats. One of these was the use of multi-factor authentication across all remote access services.

Multi-factor authentication is like a security door- an extra layer of protection keeping your business safe and creates an additional layer of cyber security.

If hackers manage to access your username and password the multi-factor authentication system will ask you to confirm access via a secondary method,  i.e. your phone. Without secondary confirmation, the hackers will not gain access.

This added measure can be the difference between successful cyber threat prevention and the compromise of your entire business network.

There are many examples of Multi-factor Authentication such as:

  • A code being sent to your mobile phone when you log on to your computer or server. The computer or server will ask you to enter a code to allow the logon to be completed.
  • Microsoft Office 365 can be configured to use Multi-factor Authentication when you set up email on a new device. Once it is set up, it is transparent to you as you can start and stop Microsoft Outlook without using the code.

An added bonus of multi-factor authentication is that it requires very little technical expertise to set up and you can begin reducing the risks of cyber threats in no time.

If you would like more information to protect yourself and your business from cyber threats and increase your cyber security, get in touch with our team today.

Read the full article series on Mitigating Cyber Threats:
Keep your devices patched
Cyber threat management software
How do I deal with a suspect email, link or attachment?
It’s easier to hack the computer than the human

 

Filed Under: News

brokerready_logo

We combine over 25 years insurance industry & technical expertise to deliver IT platforms that anticipate the needs of brokers.

Learn More

Our Services

  • IT Platforms
  • Workstation Management
  • Backup As a Service
  • Disaster Recovery

Contact Us

Call us

Australia 1300 004 566
New Zealand +64 4 889 4411

Email

info@brokerready.com.au

Copyright © 2025· BrokerReady Australia | Website by