The humble password has been around for a long time and despite its popularity as the most common way to secure accounts, it no longer cuts it in an era of enhanced cyber attacks and data breaches.
In fact, according to the 2019 Verizon Data Breach Investigations Report, 81% of all data breaches are caused by compromised, weak and reused passwords.
We all know the basics of good password security, yet 60% of us still continue to use the same password across multiple sites, choosing easy to remember passwords that contain the names of family members, nicknames, dates of birth and other easily identifiable information.
Worryingly, ‘123456’ is still the most commonly used password throughout the world, closely followed by ‘123456789’. It’s this lack of basic Cyber Security hygiene that is leading to an increased number of cyber attacks and making life all too easy for hackers.
In addition to this blasé approach to Cyber Security, hackers also have an impressive arsenal of tools that they can use to crack our passwords. Social engineering remains the most popular method, but using brute force attack, hackers have the power to test millions of possible password combinations every second.
It’s this vulnerability to attack that has fuelled the growth of finding alternative methods to secure online accounts, and two-factor authentication has quickly emerged as the go-to method to do this.
Two-factor authentication, also known as 2FA, adds an extra layer of security to your online accounts. Rather than just confirming your identity with a simple username and password, you have to provide a second authenticating factor that only you can access. Really, it’s just another way to double-check that you are who you claim to be, thereby reducing the chance of someone fraudulently accessing your account.
After logging into an account with a password, you will be prompted to confirm your identity by inputting a second form of identity verification.
There are three types of authentication that can be used:
Some of these verification methods are undoubtedly more secure than others but essentially it means that even if someone steals or guesses your password, they won’t be able to access your account without another authenticator.
If your account is protected by a second security factor, you may be given backup codes that can be used to disable two-factor authentication in the event you lose a physical security key, or an authenticator app is uninstalled.
Image: Two-Factor Authentication Process Gmail
Two-factor authentication provides an extra layer of protection that can significantly reduce the chance of your accounts being hacked. As the number of security breaches continues to rise, it’s important to take the proper precautions to safeguard your data.
The benefits of using two-factor authentication include:
In recent years, there has been a significant increase in the number of businesses that are adopting two-factor authentication as a means of protecting sensitive company data. It provides an extra barrier that can make all the difference between an attempted hack and a business crippling data breach.
Since Google implemented two-factor authentication security keys for its staff in 2017, none of its 85,000 staff have been subjected to phishing attacks. Clearly, there are real, tangible benefits from implementing stronger authentication processes.
Many organisations are also now subject to compliance regulations that require them to implement two-factor authentication to keep certain types of information private and secure from interception. This could be for logging in, resetting a password or to provide a stronger authentication process for the protection of sensitive data like personally identifiable or financial information.
Aside from complying with regulatory standards, two-factor authentication can help improve flexibility and productivity in the workplace. With an increasing number of employees working remotely, two-factor authentication enables them to access company data without compromising corporate networks.
There’s no doubt that two-factor authentication improves security and provides another layer of defence to the simple login process. However, as with many other forms of security, it can be vulnerable to attack. If a hacker is persistent enough or has the knowledge and experience to circumvent these measures, then they will.
Unfortunately, the human element continues to be the most exploitable weakness in the security chain. Using sophisticated social engineering techniques, hackers can attempt to intercept text messages, hack email accounts, and in a number of reported cases, they’ve even impersonated individuals to authorise a password reset over the phone.
That being said, these cases are rare. On the whole, two-factor authentication is safe and provides an additional layer of security that can act as a deterrent to would-be attackers.
MetaCompliance specialises in creating the best Cyber Security awareness training available on the market. Get in touch for further information on our extensive range of Cyber Security awareness courses.