Two-factor authentication is a computer access control mechanism whereby two pieces of identifying information (factors) are required before user access is granted, rather than just one.
Knowledge; Password or Pin.
Possession; Badge, Smartphone, or Device.
Inherence; Biometrics, Fingerprint and Voice Recognition.
These three methods of authentication can protect your data like your personal ID or financial assets. Some methods include push-based authentication, QR code-based authentication, one-time password authentication (event-based and time-based), and SMS-based verification. Stolen or weak passwords are the most common reason for security breaches, don’t let it happen to you, use MFA, it takes less then 5 minutes to set up and could protect you for a lifetime.
81% of passwords are weak enough to be broken within the first 5 minutes and stolen.
- Something the user knows, like a username, password, security question/answer, or PIN.
- Something the user owns, like a smartphone (via a notification or text), hardware token, or pin pad.
- Something inherent about the user, like a fingerprint, retina scan, or voice recognition.
- The user’s location, only allowing access to those in certain physical locations, or using specific IP addresses.
- A time-bound verification, only allowing entry to those authenticating within a certain time window.
Multi-factor authentication can give you remarkable peace of mind in the battle against hacking and the social engineering behind phishing attempts.
What is Multi-Factor Authentication
Multi-factor authentication (MFA) adds security to online networks by requiring more than one form (factor) of identification. It improves network security because it can’t be hacked with just a username and password.
The AuthPoint system consists of a cloud-based control centre. Everyone who needs authentication installs the freely available WatchGuard AuthPoint app on their smartphone.
AuthPoint- Multi Factor Authentication
Each login uses multi-factor authentication and is recorded in the cloud platform, forming an auditable log of successful logins and unsuccessful attempts.
There are three ways (factors) to authenticate through the AuthPoint app:
- Push Notifications – Sends a notification to the user’s mobile phone when a login attempt is made. This prompts the user to confirm or deny access through their phone. If a prompt appears when the user isn’t trying to do anything, they should deny access.
- Time-Based One Time Pass Codes (OTPs) – This requires the user to open the app and retrieve a time-restricted 6-digit code.
- QR Code Authentication – This requires the person to use the AuthPoint app to scan a unique QR code displayed on the PC screen.
The QR code method is the most secure in our estimation because a would-be hacker has to physically have your phone to scan the QR code.
AuthPoint can be used as an extra authentication step for most types of digital login.