Password protection is quite frequently the last and only layer of defence between criminals and our personal data. Whilst passwords can be very secure, there are always issues regarding online password leaks, hacking, email phishing and more. If there is only one layer of protection for our personal data, all it takes is one slip up to have potentially major repercussions. This is why having at least one more level of security is always a good idea. Enter 2-Factor Authentication (2FA).
In the simplest terms, 2-Factor Authentication is just requiring two distinct types of information to gain access to something. The first factor is usually a password, just like usual and then the second component can be a variety of things. Some examples are:
Let’s say you’re going to log in to your Twitter Account. With 2-Factor Authentication enabled, you would enter your password and then Twitter would generate a random code and send it to your mobile phone or email address. you would then be required to enter in order to gain access to you account.
These randomly generated codes are time-sensitive and so will expire after short periods of time such as 30 seconds or a minute. You can always request a new code to be sent to you if the last code expires.
2-Factor Authentication makes your account substantially more secure, because even if someone knows your password, they wouldn’t be able to login if they didn’t have access to the authentication code. And vice versa, even if someone found out the authentication code, they wouldn’t be able to login without the password. This gives some leeway for errors and allows time to change passwords with the knowledge that your personal information remains secure.
Obviously, 2-Factor Authentication will not prevent every hack attempt, as some hackers may intercept the text containing the code or gain access to your texts. This is not, to dispute the effectiveness of 2-Factor Authentication, but more just to state that it is not completely fool-proof and can be bypassed.
Codes sent via Text, whilst still substantially more secure than using just a password, are the least secure form of 2-Factor Authentication. So if you wish to use your mobile device for authentication, it is recommended that you install and use the authenticator app whenever possible.
Overall, having an extra layer of protection on your online accounts is always an excellent idea to keep your online presence safe from the multitude of threats that are posed by cyber criminals on a daily basis around the world.
If you enjoyed this briefing paper, check out our other digital resources which cover a wide range of topics, including quantum computing, social media, and 3D printing.
The Lancashire Cyber Foundry runs a series of business strategy and cyber workshops specifically designed for SMEs in Lancashire. We’re passionate about seeing Lancashire business become more cyber-aware and innovative and so offer funded places for companies to come and learn how to defend, innovate and grow their business. Additionally, we have an experienced technical team ready to help you with your business innovation ideas, particularly around cyber and digital innovation.
Get the latest updates on news and events from the Lancashire Cyber Foundry team.
By filling in this form you register for our e-newsletter, which will help explain the programme and how we could benefit your business. Registering does not place you under any obligation, and you can unsubscribe from communications at any time using the unsubscribe link at the bottom of our newsletters. Lancaster University will hold and use the information which you supply in line with our privacy policy.
© 2021 Lancaster University