Blog

The Bare Minimum

The Bare Minimum

October 18, 20241 min read

Many businesses still don’t use MFA to secure VPN access. Is yours one of them? How would you know if a threat actor logged in with stolen credentials?


Here are some MFA options to consider:

1️⃣ Smart Cards and Hardware Tokens: Employing physical devices like smart cards and hardware tokens to generate unique codes, making it nearly impossible for unauthorized access. These combined methods offer a robust defense against potential threats.

2️⃣ Machine Certificates: Certificates issued to devices for authentication, ensuring only trusted machines can access the VPN.

3️⃣ Mobile App Authenticators: Apps like Google Authenticator and Microsoft Authenticator generate time-based codes for enhanced security.

4️⃣ Biometric MFA: Utilizing fingerprints, facial recognition, or even iris scans for user validation.

5️⃣ Push Notifications: Users receive a prompt on their mobile devices to approve or deny access requests.

Don’t forget about posture assessments and don’t underestimate the risks of leaving your remote access unprotected. Implementing MFA is essential to defend against potential security breaches and keep your organization’s data safe.

Mr. Hawbaker is one of the co-founders of Valenture and an experienced network and security engineer. Joel studied at the University of Illinois’ College of Electrical and Computer Engineering as well as at Columbia College Chicago. He has spent the last 20 years in various IT disciplines and has hands-on experience in some of the world’s largest networks.

A Chicagoland native, Joel now lives in Tennessee with his family.

Joel Hawbaker

Mr. Hawbaker is one of the co-founders of Valenture and an experienced network and security engineer. Joel studied at the University of Illinois’ College of Electrical and Computer Engineering as well as at Columbia College Chicago. He has spent the last 20 years in various IT disciplines and has hands-on experience in some of the world’s largest networks. A Chicagoland native, Joel now lives in Tennessee with his family.

Back to Blog

We Can Help

Call us at (855) 605-5042 or fill out the form below.

Featured Posts

The Bare Minimum

The Bare Minimum

October 18, 20241 min read

Many businesses still don’t use MFA to secure VPN access. Is yours one of them? How would you know if a threat actor logged in with stolen credentials?


Here are some MFA options to consider:

1️⃣ Smart Cards and Hardware Tokens: Employing physical devices like smart cards and hardware tokens to generate unique codes, making it nearly impossible for unauthorized access. These combined methods offer a robust defense against potential threats.

2️⃣ Machine Certificates: Certificates issued to devices for authentication, ensuring only trusted machines can access the VPN.

3️⃣ Mobile App Authenticators: Apps like Google Authenticator and Microsoft Authenticator generate time-based codes for enhanced security.

4️⃣ Biometric MFA: Utilizing fingerprints, facial recognition, or even iris scans for user validation.

5️⃣ Push Notifications: Users receive a prompt on their mobile devices to approve or deny access requests.

Don’t forget about posture assessments and don’t underestimate the risks of leaving your remote access unprotected. Implementing MFA is essential to defend against potential security breaches and keep your organization’s data safe.

Mr. Hawbaker is one of the co-founders of Valenture and an experienced network and security engineer. Joel studied at the University of Illinois’ College of Electrical and Computer Engineering as well as at Columbia College Chicago. He has spent the last 20 years in various IT disciplines and has hands-on experience in some of the world’s largest networks.

A Chicagoland native, Joel now lives in Tennessee with his family.

Joel Hawbaker

Mr. Hawbaker is one of the co-founders of Valenture and an experienced network and security engineer. Joel studied at the University of Illinois’ College of Electrical and Computer Engineering as well as at Columbia College Chicago. He has spent the last 20 years in various IT disciplines and has hands-on experience in some of the world’s largest networks. A Chicagoland native, Joel now lives in Tennessee with his family.

Back to Blog

Enroll in Our Email Course

Learn How a No-Nonsense IT Strategy Benefits Your Company:
  • Strategies to allocate your IT budget efficiently

  • Enhance cybersecurity defenses on a budget

  • Ensure your technology investments continue to serve your business as it grows