Two-Factor Authentication- annoying but important!
Passwords have been used to secure facilities and information since ancient times. The Greeks and Romans used password protection in their militaries to ensure that approaching troops could be trusted.
Every time we want to sign in, first, we must remember our username and password ( with at least a bazillion characters, numbers, capital letters and symbols it’s so strong that even we cannot remember it! )
Oh wait, what’s this? Is it asking for another code? Where did I put my phone? Arrrgghhh !!!
Everyone can agree on this and all have felt this more often than not. Two-Factor Authentication can be annoying at times but it is a very important tool!
Throughout the course of history passwords have proven themselves to be error-prone to a number of threats, so security professionals came up with Two-Factor Authentication to let the good guys in and keep the bad guys out!
What is Two-Factor Authentication?
Two-factor authentication is a login method that requires you to present two pieces of verification to log into an account. This contrasts with single-factor authentication, where you only have to enter a password to gain access to your account.
Generally, there are three types of “factors” that can be used for authentication:
- Something you know: Any information that you know and nobody else (hopefully) does- Hint Questions
- Something you have: A possession of yours- Phone, Security Key.
- Something you are: A body part that uniquely identifies you- Fingerprint, Face Unlock, Voice Recognition.
Why do we need Two-Factor Authentication?
Even if you have a super-strong password, you might turn it over to a malicious person by falling for a phishing attack or another form of social engineering. Your password could also be exposed through no fault of your own in a website security breach and that’s where Two-Factor Authentication provides you with an extra layer of security.
Trustworthy Two-Factor Authentication Tools:
1) Google Authenticator:
Google Authenticator is a mobile security application that helps to verify user identities before granting them access to websites and services. To gain access, the user types his username and password and then enters a one-time passcode (OTP) that was delivered to his device, triggered by the login. That combination verifies that the same person entering login data on the site is in possession of the device to which the Google Authenticator app was downloaded.
2) Titan Security Key:
Perhaps the strongest Two-Factor Authentication tool available right now. Security keys use public key cryptography to verify a user’s identity and URL of the login page ensuring attackers can’t access your account even if you are tricked into providing your username and password. Titan Security Keys are built with a hardware chip that includes firmware engineered by Google to verify the key’s integrity. This helps to ensure that the keys haven’t been physically tampered with.
Two-factor authentication must be used because it protects you from getting hacked or getting your information stolen. As technology continues to evolve with more focus on the individual user, authentication security will only become more exciting and more important.
Have you joined the Learn to Earn Cloud Security Challenge? Build your security skills with free access to 25+ hands-on labs, plus an opportunity to win, grow your network, showcase your skills and get knowledge of all the tools that are keeping the Cloud Secure!