Posted in Applications

Loyal I.T. Solutions Five Recommended Authenticator Applications or Hardware

Posted by Deb Cashion on 20 April 2023
Loyal I.T. Solutions Five Recommended Authenticator Applications or Hardware
  Authentication and password security is part of the Essential Eight of Cyber Security and it is strongly advised for your network security. Using an authentication application is also evidence of compliance for insurance policies and investigations. In the past Loyal I.T. Solutions has strongly urged all their clients to implement two factor (2FA) or multi-factor (MFA) authentication. Our recommendation is to have two forms of authentication – one, a one-time passcode (OTP) via...
Posted in:SecurityCyber SecurityApplications  
< Previous | 1 | 2 | Next >

Log a Job
Or an Enquiry

help@loyalit.com.au

Loyal IT
Latest news

24 November 2025
Recharge, Reconnect, Play: The Importance of Our Team Day Last Thursday afternoon, the office quietened down a ...
Read All Latest News

Our Clients
say

We are always happy with Loyal IT’s work. Everyone I have dealt with at Loyal IT is always very friendly and takes the time to help me out with every and any tech issues I have and get the job done properly. ...

Bonnie O'Brien
Read All Testimonials

Resources Helpful
fact sheets

Download Our Fact Sheets

Sign Up for Newsletter