Two-factor authentication is a computer access control mechanism whereby two pieces of identifying information (factors) are required before user access is granted, rather than just one.

Knowledge; Password or Pin.
Possession; Badge, Smartphone, or Device.
Inherence; Biometrics, Fingerprint and Voice Recognition.

These three methods of authentication can protect your data like your personal ID or financial assets. Some methods include push-based authentication, QR code-based authentication, one-time password authentication (event-based and time-based), and SMS-based verification. Stolen or weak passwords are the most common reason for security breaches, don’t let it happen to you, use MFA, it takes less then 5 minutes to set up and could protect you for a lifetime.

81% of passwords are weak enough to be broken within the first 5 minutes and stolen.

Multi-Factor Authentication

  • Something the user knows, like a username, password, security question/answer, or PIN.
  • Something the user owns, like a smartphone (via a notification or text), hardware token, or pin pad.
  • Something inherent about the user, like a fingerprint, retina scan, or voice recognition.
  • The user’s location, only allowing access to those in certain physical locations, or using specific IP addresses.
  • A time-bound verification, only allowing entry to those authenticating within a certain time window.

Multi-factor authentication can give you remarkable peace of mind in the battle against hacking and the social engineering behind phishing attempts.

What is Multi-Factor Authentication

Multi-factor authentication (MFA) adds security to online networks by requiring more than one form (factor) of identification. It improves network security because it can’t be hacked with just a username and password.


MFA- Authpoint

The AuthPoint system consists of a cloud-based control centre. Everyone who needs authentication installs the freely available WatchGuard AuthPoint app on their smartphone.

Click Here

AuthPoint- Multi Factor Authentication

Each login uses multi-factor authentication and is recorded in the cloud platform, forming an auditable log of successful logins and unsuccessful attempts.

There are three ways (factors) to authenticate through the AuthPoint app:

  • Push Notifications – Sends a notification to the user’s mobile phone when a login attempt is made. This prompts the user to confirm or deny access through their phone. If a prompt appears when the user isn’t trying to do anything, they should deny access.
  • Time-Based One Time Pass Codes (OTPs) – This requires the user to open the app and retrieve a time-restricted 6-digit code.
  • QR Code Authentication – This requires the person to use the AuthPoint app to scan a unique QR code displayed on the PC screen.

The QR code method is the most secure in our estimation because a would-be hacker has to physically have your phone to scan the QR code.

AuthPoint can be used as an extra authentication step for most types of digital login.