Two-Factor Authentication

14th January 2020 | Cybrary Two-Factor Authentication


two factor authentication infographic

Two-Factor Authentication (2FA) is the use of two of the following three identification factors: 

  1. Something you know – Most often a password for your account.
  2. Something you have – Such as a cell phone with a temporary authentication code.
  3. Something you are – Such as your fingerprint or facial recognition.

Using two of these three identification factors is the best way to protect your critical accounts. Hackers know that most people don’t have or use password managers set up with strong passwords and they don’t use 2FA. As a result these hackers send out phishing attacks to steal unsuspecting user’s login credentials. With two-factor authentication enabled on your accounts, it will require more than just your username and password to gain access to those accounts. Hackers would also require another identification factor (something you have or something you are), effectively locking  hackers out of your accounts.

CyberHoot Tip:

Start enabling 2FA on your critical accounts.  Your bank probably requires 2FA already for online backing.  Use it there and also enable on critical accounts like your Email, company VPN, and any Internet facing services you provide to your clients.

Related Terms: Password Manager, Phishing

For more information on Two-Factor Authentication, watch this short CyberHoot training video:

Secure your business with CyberHoot Today!!!


Sign Up Now

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

DocuSign has become one of the most trusted tools in modern business. Contracts, HR paperwork, NDAs, vendor...

Read more
PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more
Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more