this post was submitted on 21 Jan 2024
17 points (100.0% liked)

Cybersecurity

5695 readers
163 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
 

For our business we use a number of different apps and websites but only two of them offer 2FA with a security key. The rest allow for an authenticator app. In this case, it seems just using an authenticator app would be best for consistency and without needing to purchase keys.

Of course, installing authenticatior apps on each device would be a no-no since it wouldn't technically be 2FA. Then do we use each employee's personal phones? Not sure how to proceed.

you are viewing a single comment's thread
view the rest of the comments
[–] perviouslyiner@lemmy.world 9 points 10 months ago* (last edited 10 months ago) (5 children)

Ask whether people are happy using the generator app on their phone, and provide phones to anyone who isn't comfortable with using their own device for that.

You'll probably end up with two or three authenticator apps, since some sites want to have their own app instead of using TOTP.

[–] FriedSink@thelemmy.club 3 points 10 months ago (1 children)

What about using a password manager to store 2FAs for apps and websites and then a security key for the password manager 2FA?

[–] cron@feddit.de 4 points 10 months ago

I'm not too happy with this solution. Not extremely bad, but technically, both password and the second factor are stored in the same place, which makes this similar in security to just using a long, random password with a password manager.

load more comments (3 replies)