Multi-Factor Authentication (Topic Outline)

Article Details

At Gingr, we're committed to ensuring the security and protection of your data. Your trust in our services is paramount to us, and we continuously strive to provide the utmost security for your business. However, the most common source of data exposure comes from the most innocuous places, such as weak passwords, user account sharing, and relaxed permissions of who can access and manipulate your data.

In accordance to best security practices as well as following industry security standards, Gingr has implemented multi-factor authentication (MFA) capabilities. MFA is required for all admin user accounts as well as include an opt-in feature for other non-admin user groups if businesses would like to implement MFA for other user groups as well!

MFA is an extra layer of security that requires users to provide two or more verification forms before gaining access to their accounts. This additional step will significantly enhance the security of your accounts, making it even more challenging for unauthorized individuals to breach your data.

 

Before You Begin

  • For non-admin user groups, your user group must have the Require MFA At Login permission to sign in with Multi-Factor Authorization.

 

Best Practices

We want to take a moment to highlight the significance of securing your business data with best practices around user logins and access control to help you safeguard your digital information inside and outside of Gingr. We firmly believe that a proactive approach to security protects your sensitive information and helps your business's overall success. Here are some key best practices we encourage you to follow:

  • Strong Passwords: Your password is the first defense against unauthorized access. Please ensure that your passwords are strong, unique, and regularly updated. Combining uppercase and lowercase letters, numbers, and symbols is highly recommended.

  • User Account Sharing: Never share your user account credentials with anyone or leave account credentials in a place where they may be seen or captured by someone else. While sometimes convenient, sharing login information poses a significant security risk. Each team member should have a unique account login to ensure accountability and data security. 

  • Proper Permission Delegation: Review and manage user permissions diligently. Only grant access to the essential data and features for each team member's role. Restricting access to sensitive information is a vital security measure. Did you know that Gingr recently expanded its permission system to enable you to delegate specific admin functions to non-admins? 

 

Topics

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request

Comments

0 comments

Article is closed for comments.