Contact Sales: |   Support: | Pay My BillClient SupportLet’s Talk!

Single Sign On: The Secure, Simple Log-in Tool That Stops Hackers in Their Tracks

If you’ve been paying attention to business headlines, chances are you’ve heard of the latest crippling ransomware attacks. Small cybersecurity incursions have turned to major geopolitical and business failures—like the Solar Winds attack on US Governent agencies, the ransomware demands that shut down the Colonial pipeline, and the attack on JBS Meatpacking that slowed beef production around the world. 

If you think your business is too small to attract the attention of ransomware thieves, think again. A new ransomware attack takes place about every 11 seconds, according to Cybercrime Magazine, and small and medium sized organizations are just as likely to get hit as large multi-nationals. In fact, a recent report from Cybersecurity Ventures predicts that global ransomware damage will top $20 billion in 2021—up more than 57 times what it was in 2015. 

How are criminals able to get their hands on so many files and systems to ransom? In most cases, by coming right through your digital front door: your company’s login. Luckily, there’s one very effective way any company can fight back: single sign on verification, run through a multi-factor authentication system. It’s a tool so useful, it even gained a mention in President Biden’s recent executive order on Cybersecurity. As an IT services provider specializing in small and medium-sized businesses, Iconic IT strongly recommends SSO to every client. Let’s take a closer look at how it could work for you. 

What is Single Sign On (SSO)? 

Single sign on (SSO) is an authentication service that allows your employees to sign in to your system using just one master log-in. From a user experience point of view, it’s the gold standard, allowing them automatic access to all the programs and services they’re signed up for, without having to verify their identity over and over again. Yet, because it requires one extra verification step, it eliminates the opportunity thieves have to impersonate users. So it often stops crime in its tracks. 

And that’s important, because cyber criminals capitalize on small, innocent user mistakes. Employees often don’t realize that guy sitting next to them in the coffee shop has a tracker on their wifi, recording their keystrokes as they log in. They don’t know that that fake email from the CEO had a link that downloaded log-in stealing malware. While single sign on is no magic wand that makes all cyber crime disappear, it does eliminate some of the most common and damaging entry points for thieves. 

How does single sign on work? 

Single sign on works by using “secure tokens” that package all your data together in one sign in. When employees want to sign on to your system, they type their password into your company portal. That portal then sends the log-in via a security token to an SSO provider. The provider looks at the security token, verifies it, and activates one extra layer of authentication. In most cases, it will send a log-in request to a security app that might be placed on an employee’s phone, such as DUO Mobile. The app will ping the user, asking them to verify the log-in. Depending on the app, this verification could be a fingerprint, or hitting “yes” in a text, or tapping on a check mark. No more log ins needed! 

Regardless, the single sign on app requires that your employees be logged into another device, like their phone, to activate the log-in to your system. This multi-factor authentication makes it far harder for far away thieves to hack your network. And most employees find single sign on systems to be sleek, easy to use, and unobtrusive. 

How to find out more: 

Want to do some deeper research on single sign on?  Iconic IT can help you do your homework with our two-factor authentication guide, develop a security strategy around SSO with our cybersecurity plan, and advise your employees with our blog on 9 steps to a stronger password. 

And as always, if you need a turnkey IT services partner to help install the proper security protocols in your organization, we’d love to help you!  Contact us and set up a free consultation, today! 

Do-It-Youself Cybersecurity Checklist

RECENT BLOG POST

Blog

Mobile Device Management (MDM)

Nearly half of all corporate hacks originate with employee mobile phones and tablets. But you can fight back—with mobile device management programs that can eliminate the lion’s share of hacker’s best tricks.
Read Post
single sign on Blog

Single Sign On: The Secure, Simple Log-in Tool That Stops Hackers in Their Tracks

If you’ve been paying attention to the headlines, you know ransomware attacks are costing the global business community billions. But did you know a simple security tool like single sign on log-in systems can stop a hacker in his tracks?
Read Post
Cryptocurrency Security Blog

Securing the Future: Cryptocurrency Security

Cryptocurrency is the next evolution in the payment cycle. With cybercrime on the rise, cryptocurrency security is more important than ever – Iconic IT is here to help.
Read Post