{"id":15299,"date":"2020-04-02T14:25:39","date_gmt":"2020-04-02T19:25:39","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=15299"},"modified":"2025-12-19T15:21:32","modified_gmt":"2025-12-19T20:21:32","slug":"multifactor-authentication","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/","title":{"rendered":"Secure Remote User Credentials with Multifactor Authentication"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15299\" class=\"elementor elementor-15299\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a9eefd8 e-flex e-con-boxed e-con e-parent\" data-id=\"4a9eefd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-641b3401 elementor-widget elementor-widget-text-editor\" data-id=\"641b3401\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.firewalls.com\/category\/multifactor-authentication.html\" target=\"_blank\" rel=\"noopener noreferrer\">Multifactor authentication<\/a> &#8211; aka MFA &#8211; means the bad guys are S.O.L. even if they get your name and password. By requiring multifactor authentication for users on your network, you ensure that connection attempts provide two or more pieces of evidence before allowing a user access to any resources or applications.<\/p><p>Attackers are turning their attention to the vulnerabilities of remote access because <a href=\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">working from home has become a requirement of doing business in 2020<\/a>. With so many workers connecting remotely, hackers are focusing on phishing, social engineering, link spoofing, and business email compromise as ways to steal user credentials, access company resources, and exfiltrate sensitive data.<\/p><p>By adding multiple layers of authentication beyond the simple password (and let\u2019s be honest, how many of your employees are <em>really<\/em> using long, complicated passwords?), you can safeguard against these vulnerabilities of human error. And with so many employees working from their home office out of the IT department\u2019s direct line of sight, you\u2019re going to want a few extra safeguards until we\u2019re all back on premise.<\/p><h3>FortiToken Mobile: One-Time Password Generator<\/h3><p><a href=\"https:\/\/www.firewalls.com\/brands\/fortinet\/fortitoken-mobile.html?product_list_order=price\" target=\"_blank\" rel=\"noopener noreferrer\">Fortinet\u2019s FortiToken Mobile<\/a> is a one-time password generator application compatible with both Android and iOS devices. It supports both time-based and event-based password tokens, adding versatility to how users can be authenticated. The app instantly generates a single-use token right on the mobile device that users are carrying around in their pocket all day long. Even if attackers are able to steal your username and password, they\u2019ll have to pay a visit in-person to steal your mobile phone too.<\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-15302 size-medium\" src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/fortitokenmobile-e1585854894290-300x192.png\" alt=\"Fortinet FortiToken multifactor authentication\" width=\"300\" height=\"192\" srcset=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/fortitokenmobile-e1585854894290-300x192.png 300w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/fortitokenmobile-e1585854894290.png 501w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p><p>FortiToken Mobile is a great solution for small businesses that are looking to get started with multifactor authentication at a low price-point. SMBs can get started with licenses for as few as just five employees. Adding additional licensing is quick and easy, making the solution scalable with your needs. Plus, because FortiToken Mobile is sold as perpetual licenses, you only have to pay once. No annual renewals or subscriptions needed.<br \/><a href=\"https:\/\/www.firewalls.com\/brands\/fortinet\/fortitoken-mobile.html\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/><button class=\"btn btn-primary\">Shop Fortinet FortiToken<\/button><\/a><\/p><h3>WatchGuard AuthPoint: Versatile cloud-based authentication<\/h3><p><a href=\"https:\/\/www.firewalls.com\/brands\/watchguard\/watchguard-authpoint.html\" target=\"_blank\" rel=\"noopener noreferrer\">WatchGuard AuthPoint Mobile<\/a> is designed to work the way your employees work. That means versatility, scalability, and ease-of-use are key. Network administrators can assign different kinds of authentication to specific users, groups, or applications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31af3bd elementor-widget elementor-widget-image\" data-id=\"31af3bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1280\" height=\"686\" data-src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/producto_authpoint_0.png\" class=\"attachment-full size-full wp-image-15303 lazyload\" alt=\"WatchGuard AuthPoint multifactor authentication\" data-srcset=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/producto_authpoint_0.png 1280w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/producto_authpoint_0-300x161.png 300w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/producto_authpoint_0-1024x549.png 1024w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/producto_authpoint_0-768x412.png 768w\" data-sizes=\"(max-width: 1280px) 100vw, 1280px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1280px; --smush-placeholder-aspect-ratio: 1280\/686;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-927ca1e elementor-widget elementor-widget-text-editor\" data-id=\"927ca1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Mobile Push Notification \u2014 AuthPoint\u2019s mobile device option sends push notifications to a user\u2019s phone after they attempt to log in with their username and password. By responding to this push notification, users let AuthPoint know whether to accept or deny the access attempt.<\/p><p><strong>QR Code<\/strong> \u2014 AuthPoint supports a QR code version that works with mobile devices as well. After a user attempts to sign into a machine with name and password, a heavily-encrypted QR code is generated onscreen which can then be read by the AuthPoint app on their mobile device.<\/p><p><strong>One-Time Password (OTP)<\/strong> \u2014 Like FortiToken, AuthPoint Mobile is able to generate unique one-time passwords that temporarily act as authentication credentials for the AuthPoint app.<\/p><p><a href=\"https:\/\/www.firewalls.com\/brands\/watchguard\/watchguard-authpoint.html\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/><button class=\"btn btn-primary\">Shop WatchGuard AuthPoint<\/button><\/a><\/p><p>\u00a0<\/p><h3>Multifactor Authentication &amp; VPNs<\/h3><p>Many of us will be working from home for the foreseeable future and Firewalls.com has seen a mad dash of small businesses trying to stay connected through <a href=\"https:\/\/www.firewalls.com\/category\/secure-remote-access.html\" target=\"_blank\" rel=\"noopener noreferrer\">secure remote access<\/a>, virtual private networks, and email security. Solutions like <a href=\"https:\/\/www.firewalls.com\/brands\/watchguard\/watchguard-ipsec-vpn-client.html\" target=\"_blank\" rel=\"noopener noreferrer\">WatchGuard IPSec VPN Clients<\/a> are a great way to keep remote users safely tethered to company resources and applications, but the human factor always leaves vulnerabilities. Most VPN services require only a username and password combination, making them ripe targets for credential theft and phishing attacks.<\/p><p>Compromised VPNs present a greater threat than any single application or endpoint being infected. Once an attacker is able to win a foothold in a remote access tunnel, they\u2019ve got a direct pipeline right back into the heart of your network. When most of your network\u2019s users are reaching out through dozens of VPN tunnels, multifactor authentication becomes a must-have security feature, not a convenient add-on.<\/p><p><a href=\"https:\/\/www.firewalls.com\/category\/multifactor-authentication.html\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/><button class=\"btn btn-primary\">Shop All Multifactor Authentication<\/button><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>VPNs offer big security, but human error leaves you exposed. Secure remote workers with multifactor authentication like WatchGuard AuthPoint &#038; FortiToken.<\/p>\n","protected":false},"author":5,"featured_media":27489,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[611],"tags":[354,439,438,122,453],"class_list":["post-15299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-multifactor-authentication","tag-fortinet","tag-fortitoken","tag-multifactor-authentication","tag-watchguard","tag-watchguard-authpoint"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure Remote User Credentials with Multifactor Authentication - Firewalls.com<\/title>\n<meta name=\"description\" content=\"VPNs offer big security, but human error leaves you exposed. Secure remote workers with multifactor authentication like WatchGuard AuthPoint &amp; FortiToken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Remote User Credentials with Multifactor Authentication - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"VPNs offer big security, but human error leaves you exposed. Secure remote workers with multifactor authentication like WatchGuard AuthPoint &amp; FortiToken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-02T19:25:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T20:21:32+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/Secure-Remote-User-Credentials-with-Multifactor-Authentication.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"Secure Remote User Credentials with Multifactor Authentication\",\"datePublished\":\"2020-04-02T19:25:39+00:00\",\"dateModified\":\"2025-12-19T20:21:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/\"},\"wordCount\":665,\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/Secure-Remote-User-Credentials-with-Multifactor-Authentication.png\",\"keywords\":[\"fortinet\",\"fortitoken\",\"multifactor authentication\",\"watchguard\",\"watchguard authpoint\"],\"articleSection\":[\"Multifactor Authentication\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/\",\"name\":\"Secure Remote User Credentials with Multifactor Authentication - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/Secure-Remote-User-Credentials-with-Multifactor-Authentication.png\",\"datePublished\":\"2020-04-02T19:25:39+00:00\",\"dateModified\":\"2025-12-19T20:21:32+00:00\",\"description\":\"VPNs offer big security, but human error leaves you exposed. Secure remote workers with multifactor authentication like WatchGuard AuthPoint & FortiToken.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#primaryimage\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/Secure-Remote-User-Credentials-with-Multifactor-Authentication.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/Secure-Remote-User-Credentials-with-Multifactor-Authentication.png\",\"width\":1120,\"height\":630,\"caption\":\"Multifactor authentication stops attackers from accessing your network through compromised VPNs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firewalls.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Remote User Credentials with Multifactor Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/firewallscom\",\"https:\/\/x.com\/firewallscom\",\"https:\/\/www.linkedin.com\/company-beta\/1439857\/\",\"https:\/\/www.youtube.com\/user\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\/\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure Remote User Credentials with Multifactor Authentication - Firewalls.com","description":"VPNs offer big security, but human error leaves you exposed. Secure remote workers with multifactor authentication like WatchGuard AuthPoint & FortiToken.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/","og_locale":"en_US","og_type":"article","og_title":"Secure Remote User Credentials with Multifactor Authentication - Firewalls.com","og_description":"VPNs offer big security, but human error leaves you exposed. Secure remote workers with multifactor authentication like WatchGuard AuthPoint & FortiToken.","og_url":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2020-04-02T19:25:39+00:00","article_modified_time":"2025-12-19T20:21:32+00:00","og_image":[{"width":1120,"height":630,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/Secure-Remote-User-Credentials-with-Multifactor-Authentication.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"Secure Remote User Credentials with Multifactor Authentication","datePublished":"2020-04-02T19:25:39+00:00","dateModified":"2025-12-19T20:21:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/"},"wordCount":665,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/Secure-Remote-User-Credentials-with-Multifactor-Authentication.png","keywords":["fortinet","fortitoken","multifactor authentication","watchguard","watchguard authpoint"],"articleSection":["Multifactor Authentication"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/","url":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/","name":"Secure Remote User Credentials with Multifactor Authentication - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/Secure-Remote-User-Credentials-with-Multifactor-Authentication.png","datePublished":"2020-04-02T19:25:39+00:00","dateModified":"2025-12-19T20:21:32+00:00","description":"VPNs offer big security, but human error leaves you exposed. Secure remote workers with multifactor authentication like WatchGuard AuthPoint & FortiToken.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/Secure-Remote-User-Credentials-with-Multifactor-Authentication.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/Secure-Remote-User-Credentials-with-Multifactor-Authentication.png","width":1120,"height":630,"caption":"Multifactor authentication stops attackers from accessing your network through compromised VPNs"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Secure Remote User Credentials with Multifactor Authentication"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=15299"}],"version-history":[{"count":21,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15299\/revisions"}],"predecessor-version":[{"id":27490,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15299\/revisions\/27490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/27489"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=15299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=15299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=15299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}