SHAREVAULT ANNOUNCES TWO-STEP VERIFICATION (TWO FACTOR AUTHENTICATION)

10 August, 2016
 

Los Gatos, Calif. - Aug 10, 2015 Today, ShareVault announced Two-Step Verification (2SV), also known as two-factor authentication, which further increases the security of ShareVault, while adding only a few extra steps to the activation and login steps for users of ShareVaults protected by 2SV. Verification works by sending a code by SMS text message to the user's mobile phone, or by using the Google Authenticator app on the user's smart phone. 

TwoFactorAuthentication-1

Enhanced Security

2SV provides significantly enhanced security because a hacker attempting to gain access to a ShareVault account would need to not only hack into the user's email account, but also gain access to the user's SMS, which uses a completely separate and independent network.  In addition, a hacker would need to know the user's password or security question.  Finally, 2SV makes it much more difficult for an authorized user to share his/her credentials with another unauthorized person.

Easy to Set Up and Use

To enable 2SV, customers simply need to request that it be enabled, and with a few mouse clicks, they can configure 2SV.  Users who have been configured for 2SV will receive a security code via text message to their mobile phone while logging in from an unrecognized computer. For users who want to login to ShareVault from a location that does not have cellphone coverage, ShareVault 2SV also supports Google Authenticator or equivalent, which is available on all major smart phones (iOS, Android, Windows Phone and Blackberry). Administrators can enable or disable 2SV on a per-user basis, as well as configure how long a trusted computer can access the ShareVault before it must re-validate by sending a new text message or entering a new Google authenticator code.

 

 

Read More About Two-Step Verification

READ MORE

Popular Posts

About the Author

Phillip Bandy is ShareVault’s chief information security officer (CISO) and is responsible for establishing security standards and controls, guiding the implementation of security technologies, and managing the establishment and implementation of security policies and procedures. He is an expert in computer incident response and has implemented computer security controls for NASA’s Mission Control.

Stay up to date on the latest industry tips and advice