Two-factor authentication is a computer access control mechanism whereby two pieces of identifying information (factors) are required before user access is granted, rather than just one.
Password or Pin.
Badge, Smartphone, or Device.
Biometrics, Fingerprint and Voice Recognition.
These three methods of authentication can protect your data like your personal ID or financial assets. Some methods include push-based authentication, QR code-based authentication, one-time password authentication (event-based and time-based), and SMS-based verification. Stolen or weak passwords are the most common reason for security breaches, don’t let it happen to you, use MFA, it takes less then 5 minutes to set up and could protect you for a lifetime.
81% of passwords are weak enough to be broken within the first 5 minutes and stolen.
- Something the user knows, like a username, password, security question/answer, or PIN.
- Something the user owns, like a smartphone (via a notification or text), hardware token, or pin pad.
- Something inherent about the user, like a fingerprint, retina scan, or voice recognition.
- The user’s location, only allowing access to those in certain physical locations, or using specific IP addresses.
- A time-bound verification, only allowing entry to those authenticating within a certain time window.
Multi-factor authentication can give you remarkable peace of mind in the battle against hacking and the social engineering behind phishing attempts.
What is multi-factor authentication
Multi-factor authentication (MFA) adds security to online networks by requiring more than one form (factor) of identification. It improves network security because it can’t be hacked with just a username and password.
AuthPoint- Multi Factor Authentication
Each login uses multi-factor authentication and is recorded in the cloud platform, forming an auditable log of successful logins and unsuccessful attempts.
There are three ways (factors) to authenticate through the AuthPoint app:
- Push Notifications – Sends a notification to the user’s mobile phone when a login attempt is made. This prompts the user to confirm or deny access through their phone. If a prompt appears when the user isn’t trying to do anything, they should deny access.
- Time-Based One Time Pass Codes (OTPs) – This requires the user to open the app and retrieve a time-restricted 6-digit code.
- QR Code Authentication – This requires the person to use the AuthPoint app to scan a unique QR code displayed on the PC screen.
The QR code method is the most secure in our estimation because a would-be hacker has to physically have your phone to scan the QR code.
AuthPoint can be used as an extra authentication step for most types of digital login.