What is Two-Factor Authentication?

Two-Factor Authentication or simply “2FA” is a security process in which the user combines two or more means of identification from separate categories of credentials. One is typically a pin (personal identification number,) and the other is a memorized security code.  According to advocates, two-factor authentication can significantly reduce the incidence of online identity theft, phishing expeditions, and other online fraud, since the victim’s password is not enough to give a thief access to their account or information.

What are authentication factors?

An authentication factor is an independent category of credentials used for identity verification. The three most common categories are often described as something you know, something you have or possess, and something you are. For some systems with more demanding requirements for security, location and time are sometimes added as fourth and fifth factors.

Single-factor authentication (SFA) is based on only one category of identifying credentials. The most common SFA method is the familiar user name and password combination. The security of SFA relies upon the diligence of the users.  Best practices for selecting strong passwords is an added protection to increase security.

Two-factor authentication (2FA) – Pros and Cons

Usernames and passwords are sometimes not enough.  In the technological world of today, simply having a strong password on your account does not necessarily secure it.  Security experts are seeing patterns where hackers are breaching into the cloud services, and stealing entire databases of usernames, passwords, and other personal information.  As a result, many cloud services are adding two-factor authentication, also known as 2FA to provide an additional layer of protection to user accounts.

2FA = something you know + something you have. When 2FA is enabled on one of your accounts, you need to provide your username and password and an additional something else, to prove who you really are. A great option is a token called an RSA device in which the numerical code changes every 15 or 30 seconds.  Other methods of this extra security measure can also be sent to you on your email, or a code provided on an app on your smart phone or through your regular land line phone.  These, however, are not as secure, since email and phone lines, and apps are not as secure.

Pros:

  • Great security.
  • 2FA is commonly done via a text message or smartphone authenticator app.
  • You’ll be notified when someone has your User ID and Password and hackers will most likely not penetrate the account on which the 2FA is enabled.

Con:

  • You must always carry your authenticated phone to receive your code/token.
  • Not all businesses want a second code or token type if their security needs are low.

Despite the minimal inconvenience, 2FA is very quick and easy to adopt. Should you have more questions regarding 2FA, we’re here to answer you. Call us anytime at 630-365-0025.