• Register

Data Net Blog

When Is a Phone Not a Phone? When It’s a Security Key

When Is a Phone Not a Phone? When It’s a Security Key

I’d be willing to bet that your phone is within reach at the moment, assuming you aren’t actively using it to read this blog right now. The tendency that people have to always have their phones on them has contributed to these devices becoming more deeply integrated into work processes - including security, via two-factor authentication. For this week’s tip, we’ll discuss how you can leverage an Android device as an added security measure.

For some background, it is important to understand that the Android OS now has FIDO2 certification. In essence, the FIDO (or Fast IDentity Online) Alliance has confirmed that Android meets the standards that the group has set for authentication needs.

So, What Does This Mean?

To make what could be a very lengthy conversation much shorter, it means that an Android device with Android 7.0 or higher and the latest version of Google Chrome installed can be used as a security key for your two-factor authentication needs. This also means that a device supported by FIDO2 (such as an Android device, no word on Apple supporting this yet) can leverage an onboard fingerprint scanner to confirm the identity of a user.

In other words, passwords may soon become a thing of the past.

No More Passwords?

While passwords have long been the standard form of identity authentication, they have also been shown to be somewhat simple for a determined cybercriminal to hack in one way or another. Phishing schemes and stolen databases have exposed millions of user accounts, and that’s not even counting all the times a hacker guessed that someone’s password was “letmein.”

The primary weakness of the password is the fact that it can, in fact, be shared. This is why FIDO2 is likely to become a very popular form of authentication… after all, it’s hard to share a thumbprint. FIDO2 also keeps all sensitive data - like the information read from biometrics - within the device itself, preventing it from being snagged from the Internet.

Perhaps most promising, in terms of a user’s security, FIDO2 will not allow a user to use their fingerprint on web domains and websites that are suspect (or just aren’t secure enough).

Using Your FIDO2 Android Device as a Security Key

As you would imagine, there are a few additional security-centric requirements that need to be met before you can leverage your Android device as a security key for authentication purposes. First of all, you need to have at least Android 7.0 installed, with Bluetooth turned on. In addition to this, you’ll also need the latest version of Chrome installed, and a Two-Step Verification-enabled Google account.

Once you’ve logged into your account, access Security. From there, you can activate 2-Step Verification and, you can set your smartphone to be the key required via a short process.

Using Your Phone to Authenticate Google Sign-Ins

With both Bluetooth and Location enabled on your phone, you’ll be prompted by any Google service you try to access to confirm the sign-in on your phone. By simply pressing Yes on your phone and waiting, you can sign-in to your Google account, confident that it has remained secure.

This kind of functionality is only going to appear more and more often, as more developers adopt the FIDO2 standard.

Are you looking forward to using this new authentication method? Let us know in the comments, and don’t forget to suggest any tips you think that we should cover!

The Biggest Problem with VoIP and How It Isn’t a D...
How Blockchain Will Soon Help All Companies


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, February 18, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity Privacy Data Efficiency Smartphones Malware Innovation Hackers Communication User Tips Email Microsoft Google IT Support Tech Term Managed IT Services Software Computer Small Business Hardware Communications Internet Cybersecurity VoIp Android Mobile Device Users Cloud Windows 10 Mobile Devices Business Management Outsourced IT Workplace Tips Miscellaneous Ransomware Collaboration Cloud Computing Passwords IT Services Business Social Media Apps Browser Network Data Backup Hosted Solutions Gadgets Holiday Smartphone Data recovery Wi-Fi Windows Facebook Upgrade Information Applications Internet of Things Backup Bandwidth VPN Managed Service Blockchain Patch Management Managed IT services Phishing Networking Employer-Employee Relationship Access Control Chrome Gmail Marketing Microsoft Office Wireless Word BDR Value Router Business Intelligence Compliance Managed IT Service Saving Money Automation Save Money Apple Laptop Quick Tips Connectivity Remote Monitoring Company Culture Cortana Batteries Data Management Employee-Employer Relationship Government Remote Computing How To Voice over Internet Protocol Wireless Charging Windows 7 Virus Retail Tech Terms Cost Management Office Virtual Assistant Telephone System Business Continuity Physical Security Computers Virtualization G Suite Payment Cards Office 365 Social Network Data Protection Excel Bring Your Own Device Settings Artificial Intelligence RAM Telephony Healthcare Going Green Scam Data Breach Password Remote Monitoring and Management Processor Net Neutrality Medical IT Business Technology Data Security Mobility iPhone Paperless Office Firewall Taskbar Website Hard Drives Cables Profitability Knowledge Battery Cryptocurrency Project Management WhatsApp SaaS Multi-Factor Authentication Analytics Personal Information Education Server Management Paper Hard Drive Co-Managed IT Hard Disk Drive Websites Movies Touchscreen Training Benchmarks Licensing Operating System Conferencing Lead Generation Managed Services Provider News Digital Profiles Help Desk National Security SSD Eliminating Downtime Search Telecommute GDPR Video Mobile Device Management Managing Stress eCommerce E-Commerce Bitcoin Live Streaming Ink Processors Humor Safety Microsoft Office 365 Security Cameras Risk Management Tech Support Maintenance Plug-In Electronic Health Records Vendor Law Enforcement Telecommuting Shadow IT BYOD Time Management Insurance Data loss Streaming Media Storage Customer Service Holidays Remote Support Big Data Technology Tips Troubleshooting Sales Online Shopping Payment Database PowerPoint User Tip Spyware Memes Cleaning Edge Unified Communications Authentication Wearables Alert Vulnerability Network Attached Storage Environment Internet Explorer Proactive IT Content Filtering Virtual Private Network Health Updates IT budget Twitter Wireless Internet Server Chrome OS File Management HP Spam Downloads Dark Web OneNote Update Tablet instant Messaging Threats Cybercrime Sports Reporting IT Dongle Authorization User Security e-waste Threat WannaCry Customer Relationship Management Employees Distribution Workers Certification Inventory Amazon Comparison Current Events Document Management Antivirus Trends Error Hosted Desktop Windows Server 2008 R2 Backup and Disaster Recovery Hybrid Cloud Outlook Vulnerabilities Scams Congratulations Machine Learning Tactics Tip of the week Botnet Microsoft Teams Voice over IP Recycling Travel disposal Printing HIPAA Managed Service Provider Solid State Drive Fleet Management File Sharing Millennials Display IT Management Mobile Security Specifications Human Resources Mobile Office Staff A.I. Disaster Recovery Printers WiFi Regulation Financial Computer Repair Thank You IT Service Analysis

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123