{"id":5167,"date":"2014-06-23T21:19:00","date_gmt":"2014-06-23T21:19:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/"},"modified":"2014-06-23T21:19:00","modified_gmt":"2014-06-23T21:19:00","slug":"who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/","title":{"rendered":"Who Has Access To Your Business Network? 72% Of Small Businesses Report Having Their IT Systems Accessed By Those Without Proper Authorization!"},"content":{"rendered":"

\"UnauthorizedDid you know 72% of small businesses report having their IT systems accessed by those without proper authorization? What does this mean for your small business? Well, chances are, your IT systems have also been accessed by an unauthorized individual.<\/p>\n

So how do you reduce the risks of unauthorized access? That\u2019s simple: two-factor authentication is extremely safe for businesses of any size to drastically reduce the risks of confidential information, employee records, customer orders, and accounting data from falling into the hands of those without proper authorization.<\/p>\n

While you\u2019re already familiar with the concept of a standard login name and password, two-factor authentication goes above and beyond the typical protection; however, the first factor is a username and password. But that\u2019s not always enough, especially when we consider how many computer users post their logins and passwords on sticky notes on their monitor, or simply use simple passwords such as \u201cpassword\u201d or \u201c12345.\u201d<\/p>\n

Simple Passwords Aren\u2019t Enough to Protect the Important Data Stored in Your Business Applications and On Your Network \u2013 Two-Factor Authentication Offers a More Robust Level of Security to Prevent Unauthorized Access!<\/strong><\/p>\n

Two-factor authentication offers a second level of authentication to protect the important data stored in your business applications and on your network. In fact, two-factor authentication can be considered the second hurdle to jump over! If a hacker or former employee has access to your login and password, they probably don\u2019t have the secure onetime password that\u2019s required to access the network.<\/p>\n

Essentially, two-factor authentication consists of:<\/p>\n

    \n
  1. Something you know:\u00a0 This could be a second password, secret PIN, or the answer to a question such as \u201cmother\u2019s maiden name.\u201d<\/li>\n
  2. Something you have: This could be a special hardware device, an ID badge, or a text message to your cell phone.<\/li>\n
  3. Something you are: This could be found using a fingerprint scanner, iris scanner, or some other biometric ID.<\/li>\n<\/ol>\n

    No matter what form of authentication is used, it\u2019s critical to have multiple layers of security! A hacker or disgruntled employee may have access to your password, but chances are, they don\u2019t know the second form of authentication.<\/p>\n

    Feeling concerned about your IT security? Contact {company} to prevent unauthorized access to your confidential data! Give us a call at {phone} or send us an email at {email}. We\u2019re your trusted IT security professionals and we\u2019ll make sure you\u2019re getting the correct network security advice to keep your business data safe and secure. <\/strong><\/p>\n

    \u00a0<\/strong><\/p>\n

    \u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"

    Did you know 72% of small businesses report having their IT systems accessed by those without proper authorization? What does this mean for your small business? Well, chances are, your IT systems have also been accessed by an unauthorized individual. So how do you reduce the risks of unauthorized access? That\u2019s simple: two-factor authentication is…<\/p>\n","protected":false},"author":5,"featured_media":5168,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-5167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\nWho Has Access To Your Business Network? 72% Of Small Businesses Report Having Their IT Systems Accessed By Those Without Proper Authorization! - IT Services in Virginia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Who Has Access To Your Business Network? 72% Of Small Businesses Report Having Their IT Systems Accessed By Those Without Proper Authorization! - IT Services in Virginia\" \/>\n<meta property=\"og:description\" content=\"Did you know 72% of small businesses report having their IT systems accessed by those without proper authorization? What does this mean for your small business? Well, chances are, your IT systems have also been accessed by an unauthorized individual. So how do you reduce the risks of unauthorized access? That\u2019s simple: two-factor authentication is…\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/\" \/>\n<meta property=\"og:site_name\" content=\"IT Services in Virginia\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-23T21:19:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ntegrait.com\/wp-content\/uploads\/2014\/06\/Unauthorized-access.jpg\" \/>\n<meta name=\"author\" content=\"Steve West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve West\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/\",\"url\":\"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/\",\"name\":\"Who Has Access To Your Business Network? 72% Of Small Businesses Report Having Their IT Systems Accessed By Those Without Proper Authorization! - IT Services in Virginia\",\"isPartOf\":{\"@id\":\"https:\/\/www.ntegrait.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/06\/Unauthorized-access.jpg\",\"datePublished\":\"2014-06-23T21:19:00+00:00\",\"dateModified\":\"2014-06-23T21:19:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/#primaryimage\",\"url\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/06\/Unauthorized-access.jpg\",\"contentUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/06\/Unauthorized-access.jpg\",\"width\":354,\"height\":484},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ntegrait.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Who Has Access To Your Business Network? 72% Of Small Businesses Report Having Their IT Systems Accessed By Those Without Proper Authorization!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ntegrait.com\/#website\",\"url\":\"https:\/\/www.ntegrait.com\/\",\"name\":\"IT Services in Virginia\",\"description\":\"Ntegra IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ntegrait.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\",\"name\":\"Steve West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"caption\":\"Steve West\"},\"description\":\"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.\",\"url\":\"https:\/\/ntegrait.com\/author\/swestntegrait-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Who Has Access To Your Business Network? 72% Of Small Businesses Report Having Their IT Systems Accessed By Those Without Proper Authorization! - IT Services in Virginia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/","og_locale":"en_US","og_type":"article","og_title":"Who Has Access To Your Business Network? 72% Of Small Businesses Report Having Their IT Systems Accessed By Those Without Proper Authorization! - IT Services in Virginia","og_description":"Did you know 72% of small businesses report having their IT systems accessed by those without proper authorization? What does this mean for your small business? Well, chances are, your IT systems have also been accessed by an unauthorized individual. So how do you reduce the risks of unauthorized access? That\u2019s simple: two-factor authentication is…","og_url":"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/","og_site_name":"IT Services in Virginia","article_published_time":"2014-06-23T21:19:00+00:00","og_image":[{"url":"https:\/\/www.ntegrait.com\/wp-content\/uploads\/2014\/06\/Unauthorized-access.jpg","type":"","width":"","height":""}],"author":"Steve West","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve West","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/","url":"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/","name":"Who Has Access To Your Business Network? 72% Of Small Businesses Report Having Their IT Systems Accessed By Those Without Proper Authorization! - IT Services in Virginia","isPartOf":{"@id":"https:\/\/www.ntegrait.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/#primaryimage"},"image":{"@id":"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/#primaryimage"},"thumbnailUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/06\/Unauthorized-access.jpg","datePublished":"2014-06-23T21:19:00+00:00","dateModified":"2014-06-23T21:19:00+00:00","author":{"@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79"},"breadcrumb":{"@id":"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/#primaryimage","url":"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/06\/Unauthorized-access.jpg","contentUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2014\/06\/Unauthorized-access.jpg","width":354,"height":484},{"@type":"BreadcrumbList","@id":"https:\/\/www.ntegrait.com\/who-has-access-to-your-business-network-72-of-small-businesses-report-having-their-it-systems-accessed-by-those-without-proper-authorization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ntegrait.com\/"},{"@type":"ListItem","position":2,"name":"Who Has Access To Your Business Network? 72% Of Small Businesses Report Having Their IT Systems Accessed By Those Without Proper Authorization!"}]},{"@type":"WebSite","@id":"https:\/\/www.ntegrait.com\/#website","url":"https:\/\/www.ntegrait.com\/","name":"IT Services in Virginia","description":"Ntegra IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ntegrait.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79","name":"Steve West","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","caption":"Steve West"},"description":"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.","url":"https:\/\/ntegrait.com\/author\/swestntegrait-com\/"}]}},"_links":{"self":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/5167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/comments?post=5167"}],"version-history":[{"count":0,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/5167\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media\/5168"}],"wp:attachment":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media?parent=5167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/categories?post=5167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/tags?post=5167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}