Two-Factor Authentication (2FA) for Xero – Instructional video to enhance Xero security
All businesses should be protecting their sensitive data, and financial data certainly fits near the top of that sensitive category. For users of Xero there is a free opportunity to utilise two-factor authentication (2FA) to effectively add a layer of protection, a logical step forwards in cyber security for Xero. Follow our short step-by-step instructional video to help Xero admin users access this added security feature for your Xero account.
You may have heard of Two-Factor Authentication (2FA) as Multi-factor Authentication (MFA) or Two-Step Verification (2SV), the technologies are similar, they help to improve business security significantly with an additional layer of access and identity protection. Passwords alone are no longer adequate for securing critical data assets as they are easily forgotten, compromised or stolen. This solution ensures the user has to provide two authentication factors, this would be your password plus a smartphone app generated six-digit code – together delivering the user access to Xero.
Cyber attacks can happen to any business, in any industry and of any size – globally they happen every 39 seconds, and that is accelerating. When specifically considering financial systems like Xero or Sage hackers can subtly divert finances away from their original intended targets, set up alternative bank account details, create false invoices, and a lot more. These changes can take weeks or months to discover, often when the intended recipient of funds asks why they have not been paid.
Accelerate Technologies offer an extended access and identity solution, if you would like to take your authentication to another level right across your organisation please reach out to the Accelerate team. You can see more about our identity and access solutions here >
We also offer tailored Cyber Security Assessments to small, medium and large organisations – the assessment will help to inform and guide you how to make the correct cyber security choices that will mitigate against the biggest and most important risks to your business. You can read about the assessments here >