Two-factor authentication (2FA) (2024)

  • Two-factor authentication (2FA) is a method of confirming users’ claimed identities by using a combination of two different pieces of information or factors

    Back to Glossary

    What is two-factor authentication?

    Two-factor authentication (also known as 2FA or two-step verification) is a method to confirm a user’s claimed online identity by using a combination of two different types of factors. A password is typically considered one factor, and with 2FA that is combined with another factor to increase login security. Factors used for 2FA include:

    Two-factor authentication (2FA) (1)

    Something you know

    Password or PIN

    Two-factor authentication (2FA) (2)

    Something you have

    A physical device such as a phone or authenticator.

    Two-factor authentication (2FA) (3)

    Something you are

    A fingerprint, iris or facial scan

    Two-factor authentication (2FA) (4)

    An example of two-factor authentication

    A good example of two-factor authentication is the withdrawing of money from an ATM; only the correct combination of a bank card (something that the user possesses) and a PIN (something that the user knows) allows the transaction to be carried out.

    The problem with passwords

    Two-factor authentication (2FA) (5)
    Passwords are easily breached

    The typical validation method most individuals and business users use today is a single factor password. But usernames and passwords are stored on a server and can be easily breached as cyber criminals become more organized and adept.

    Two-factor authentication (2FA) (6)

    Too many passwords

    With increasing use of email, social media, and online banking and shopping, most people have a lot of places they need to log in. In fact, most consumers have 150 online accounts and therefore many usernames and passwords to remember! As a result, online users resort to creating several complex passwords – or worse; they use the same password across multiple sites.

    Two-factor authentication (2FA) (7)
    Passwords are used repeatedly

    With many users re-using passwords across sites, once a cybercriminal gets their hands on a user’s credentials, those credentials may work across multiple accounts. Two-factor authentication is the best defense users have to protect accounts when their passwords have been stolen.

    3.3 Billion stolen credentials

    reported in 2017

    81% of data breaches

    from weak/stolen passwords

    $3.9 Million average cost

    of a breach ($148/ record)

    Two-factor authentication has become the standard

    Most service providers such as Google, Facebook and Apple already support 2FA and consider it an integral part of the authentication process.

    Types of two-factor authentication

    Two-factor authentication (2FA) (8)

    Hardware Security Keys

    Security

    Hardware security keys offer the highest levels of online security, logging into many services with just one key.

    Ease of Use

    Hardware security keys can offer passwordless login, with no code to enter. Hardware keys typically require no network connectivity, and does not rely on battery power.

    Cost

    Hardware security keys are significantly cheaper than a mobile phone, and in the case of a lost or stolen key, a backup is much cheaper than replacing a mobile phone.

    Two-factor authentication (2FA) (9)

    Text Message (SMS 2FA)

    Security

    Not very secure as this approach is vulnerable to phone number porting scams. Also, per NIST Cybersecurity Framework guidelines, the SMS 2FA approach offers a poor security level.

    Ease of Use

    Requires users to retype of copy and paste the one time code which can be confusing or time consuming. This approach typically relies on users having a mobile phone. In order to receive the code the devices needs to have network connectivity and sufficient battery life.

    Cost

    Using a mobile phone as the authenticating device can be very expensive. And, in the case of a lost or stolen device, replacing the phone can be very costly again.

    Two-factor authentication (2FA) (10)

    Authenticator Apps

    Security

    More secure than text messages but not as secure as hardware security keys based on public key cryptography.

    Ease of Use

    Requires users to retype or copy and paste the one time code, which can be a confusing and time consuming.

    Cost

    Authenticator apps are often free to download, however it relies on users having a mobile phone. While codes can be available even when the phone is offline, it is reliant on the mobile phone battery life. In the case of a lost or stolen device, replacing the phone can be very costly.

    Two-factor authentication (2FA) (11)

    Mobile Push 2FA

    Security

    More secure than text messages but not as secure as hardware security keys based on public key cryptography.

    Ease of Use

    This approach typically relies on users having a mobile phone. In order to receive the code the devices needs to have network connectivity and sufficient battery life.

    Cost

    Using a mobile phone as the authenticating device can be very expensive. And, in the case of a lost or stolen device, replacing the phone can be very costly again.

    Two-factor authentication (2FA) (12)
    Find the right Yubikey

    Take the quick Product Finder Quiz to find the right key for you or your business.

    Let’s start

    Two-factor authentication (2FA) (13)
    Get protected today

    Browse our online store today and buy the right YubiKey for you.

    Shop now

Two-factor authentication (2FA) (2024)
Top Articles
Best Finance Internships Chicago
How To Analyze Common Size Income Statement | microcap.co
Katie Nickolaou Leaving
Jesus Calling December 1 2022
Teenbeautyfitness
Wfin Local News
Imbigswoo
Locate Td Bank Near Me
Zürich Stadion Letzigrund detailed interactive seating plan with seat & row numbers | Sitzplan Saalplan with Sitzplatz & Reihen Nummerierung
How Much Is Tj Maxx Starting Pay
Wildflower1967
U/Apprenhensive_You8924
Walmart Double Point Days 2022
Midlife Crisis F95Zone
St Maries Idaho Craigslist
Loves Employee Pay Stub
Vandymania Com Forums
Two Babies One Fox Full Comic Pdf
Wkow Weather Radar
Riversweeps Admin Login
Tire Plus Hunters Creek
Idle Skilling Ascension
Does Royal Honey Work For Erectile Dysfunction - SCOBES-AR
Craigslist Sf Garage Sales
Ghid depunere declarație unică
Advance Auto Parts Stock Price | AAP Stock Quote, News, and History | Markets Insider
Homewatch Caregivers Salary
Mrstryst
Indiana Jones 5 Showtimes Near Jamaica Multiplex Cinemas
Kokomo Mugshots Busted
Exploring TrippleThePotatoes: A Popular Game - Unblocked Hub
How to Get Into UCLA: Admissions Stats + Tips
Admissions - New York Conservatory for Dramatic Arts
Google Flights Orlando
Scarlet Maiden F95Zone
Cnp Tx Venmo
Emily Browning Fansite
Shoecarnival Com Careers
2024-09-13 | Iveda Solutions, Inc. Announces Reverse Stock Split to be Effective September 17, 2024; Publicly Traded Warrant Adjustment | NDAQ:IVDA | Press Release
Candise Yang Acupuncture
Squalicum Family Medicine
How To Get To Ultra Space Pixelmon
What is a lifetime maximum benefit? | healthinsurance.org
Rise Meadville Reviews
bot .com Project by super soph
Dlnet Deltanet
Missed Connections Dayton Ohio
Craigslist Anc Ak
Mike De Beer Twitter
Texas 4A Baseball
Varsity Competition Results 2022
Latest Posts
Article information

Author: Fredrick Kertzmann

Last Updated:

Views: 6092

Rating: 4.6 / 5 (46 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Fredrick Kertzmann

Birthday: 2000-04-29

Address: Apt. 203 613 Huels Gateway, Ralphtown, LA 40204

Phone: +2135150832870

Job: Regional Design Producer

Hobby: Nordic skating, Lacemaking, Mountain biking, Rowing, Gardening, Water sports, role-playing games

Introduction: My name is Fredrick Kertzmann, I am a gleaming, encouraging, inexpensive, thankful, tender, quaint, precious person who loves writing and wants to share my knowledge and understanding with you.