-
Two-factor authentication (2FA) is a method of confirming users’ claimed identities by using a combination of two different pieces of information or factors
Back to Glossary
What is two-factor authentication?
Two-factor authentication (also known as 2FA or two-step verification) is a method to confirm a user’s claimed online identity by using a combination of two different types of factors. A password is typically considered one factor, and with 2FA that is combined with another factor to increase login security. Factors used for 2FA include:
Something you know
Password or PIN
Something you have
A physical device such as a phone or authenticator.
Something you are
A fingerprint, iris or facial scan
An example of two-factor authentication
A good example of two-factor authentication is the withdrawing of money from an ATM; only the correct combination of a bank card (something that the user possesses) and a PIN (something that the user knows) allows the transaction to be carried out.
The problem with passwords
Passwords are easily breached
The typical validation method most individuals and business users use today is a single factor password. But usernames and passwords are stored on a server and can be easily breached as cyber criminals become more organized and adept.
Too many passwordsWith increasing use of email, social media, and online banking and shopping, most people have a lot of places they need to log in. In fact, most consumers have 150 online accounts and therefore many usernames and passwords to remember! As a result, online users resort to creating several complex passwords – or worse; they use the same password across multiple sites.
Passwords are used repeatedly
With many users re-using passwords across sites, once a cybercriminal gets their hands on a user’s credentials, those credentials may work across multiple accounts. Two-factor authentication is the best defense users have to protect accounts when their passwords have been stolen.
3.3 Billion stolen credentials
reported in 2017
81% of data breaches
from weak/stolen passwords
$3.9 Million average cost
of a breach ($148/ record)
Two-factor authentication has become the standard
Most service providers such as Google, Facebook and Apple already support 2FA and consider it an integral part of the authentication process.
Types of two-factor authentication
Hardware Security Keys
Security
Hardware security keys offer the highest levels of online security, logging into many services with just one key.
Ease of Use
Hardware security keys can offer passwordless login, with no code to enter. Hardware keys typically require no network connectivity, and does not rely on battery power.
Cost
Hardware security keys are significantly cheaper than a mobile phone, and in the case of a lost or stolen key, a backup is much cheaper than replacing a mobile phone.
Text Message (SMS 2FA)
Security
Not very secure as this approach is vulnerable to phone number porting scams. Also, per NIST Cybersecurity Framework guidelines, the SMS 2FA approach offers a poor security level.
Ease of Use
Requires users to retype of copy and paste the one time code which can be confusing or time consuming. This approach typically relies on users having a mobile phone. In order to receive the code the devices needs to have network connectivity and sufficient battery life.
Cost
Using a mobile phone as the authenticating device can be very expensive. And, in the case of a lost or stolen device, replacing the phone can be very costly again.
Authenticator Apps
Security
More secure than text messages but not as secure as hardware security keys based on public key cryptography.
Ease of Use
Requires users to retype or copy and paste the one time code, which can be a confusing and time consuming.
Cost
Authenticator apps are often free to download, however it relies on users having a mobile phone. While codes can be available even when the phone is offline, it is reliant on the mobile phone battery life. In the case of a lost or stolen device, replacing the phone can be very costly.
Mobile Push 2FA
Security
More secure than text messages but not as secure as hardware security keys based on public key cryptography.
Ease of Use
This approach typically relies on users having a mobile phone. In order to receive the code the devices needs to have network connectivity and sufficient battery life.
Cost
Using a mobile phone as the authenticating device can be very expensive. And, in the case of a lost or stolen device, replacing the phone can be very costly again.
Find the right Yubikey
Take the quick Product Finder Quiz to find the right key for you or your business.
Let’s start
Get protected today
Browse our online store today and buy the right YubiKey for you.
Shop now
Two-factor authentication (2FA) (2024)
Table of Contents
What is two-factor authentication?
Something you know
Something you have
Something you are
An example of two-factor authentication
The problem with passwords
3.3 Billion stolen credentials
81% of data breaches
$3.9 Million average cost
Two-factor authentication has become the standard
Types of two-factor authentication
Hardware Security Keys
Text Message (SMS 2FA)
Authenticator Apps
Mobile Push 2FA
Top Articles
India’s 74th Republic Day Highlights: Colourful parade showcases India’s military might, cultural diversity, ‘Nari Shakti’
Why is India Republic Day celebrated on January 26?
Flipped Sandwich Shoppe
Qb Traphouse
Friday Facts #309 - Controversial opinions - Page 2
Friday Facts #417 - Space Age development | Factorio
Commuter Rail Fares | Fares Overview
Everything to know about July 4 in Boston (including how to watch the fireworks)
Swgoh Qgj Counter
Landscape Message: June 28, 2024
DOE OTT Supply Chain Analysis Assessment Event (AE)
Breaking Down the BIL: Office of Clean Energy Demonstrations
Latest Posts
Article information
Author: Madonna Wisozk
Last Updated:
Views: 5535
Rating: 4.8 / 5 (68 voted)
Reviews: 91% of readers found this page helpful
Author information
Name: Madonna Wisozk
Birthday: 2001-02-23
Address: 656 Gerhold Summit, Sidneyberg, FL 78179-2512
Phone: +6742282696652
Job: Customer Banking Liaison
Hobby: Flower arranging, Yo-yoing, Tai chi, Rowing, Macrame, Urban exploration, Knife making
Introduction: My name is Madonna Wisozk, I am a attractive, healthy, thoughtful, faithful, open, vivacious, zany person who loves writing and wants to share my knowledge and understanding with you.