Two Factor Authentication Explained

Everyone wants to protect their privacy especially in a World where cybercrime is becoming a major problem. In this blog we are going to explain what a two factor authentication (two-step authentication) is and how it works.

Two Factor Authentication Explained

Everyone wants to protect their privacy especially in a World where cybercrime is becoming a major problem. In this blog we are going to explain what a two factor authentication (two-step authentication) is and how it works.

So What Is It?

AVG described two-factor authentication (2FA) as a security measure that adds a second layer of protection in addition to your password. 2FA is implemented to protect both a user's credentials as well as the resources that they can access. 2FA makes it harder for attackers to gain access to a persons devices or online accounts because even if they know your password they still have to pass the authentication check.

How Does It Work?

There a few 2FA methods ranging from a physical security key to the Google authentication app. You can even get a one-time numeric code either by SMS or voice call.

So here is how it works, if you want to access an account you would enter your login details as normal and click submit. The online service then sends an automated request for a second piece of information (an SMS with a verification code, a Google authenticator prompt or something else that you have set up. You will only get access to your account when your identity has been confirmed with this second piece of information.

The Three Factors

The additional layer of security will generally be one of the following basic factors:
1. Something you know (a pin code)
2. Something you have (a security token that you can get via an app like Google Authenticator)
3. Something you are (biometric data such as fingerprint or facial scan)

What the M&S Cyber Attack Teaches Us About Business IT Vulnerabilities
Marks & Spencer has made headlines over the last few weeks, after it became the latest in a long list of victims, following a serious ransomware attack. The incident, first detected over the Easter weekend, has left the supermarket paralysed, with widespread disruption in stores and a complete collapse of their website, raising urgent questions about how prepared businesses are to handle modern cyber threats.
Digital Resilience: Why Strong Cybersecurity Matters Now More Than Ever
Cybersecurity is no longer just a concern for large corporations. In 2025, with digital threats becoming more sophisticated and regulation tightening across Europe and the UK, strong cybersecurity is essential for businesses of every size. Small and medium-sized enterprises are particularly vulnerable, often lacking the resources to adequately protect themselves against the increasing number of cyberattacks.
The 2025 Spring Budget: What It Means for Your IT Spending
The UK’s 2025 Spring Budget brings both opportunities and challenges for small and medium-sized enterprises (SMEs), particularly regarding technology investment. While the budget doesn't introduce sweeping reforms, it outlines key areas that could influence your IT strategy. At Edmondson’s, we’re here to help you navigate these developments and make informed decisions for your business.​

© Edmondson's IT Services | Co. Reg. No: 07818717 | VAT Reg. No: GB122507059

pay nothing for 3 months

Get 3 months of IT support at no extra cost, by signing up to a 12 month contract.

pay nothing for 3 months on your IT support

what's included

BESPOKE SUPPORT

We offer a completely customised service to support your business.

PRICE MATCH GUARANTEE

We have a price match guarantee in place to ensure you're getting the best service without compromising on quality.

PROACTIVE SUPPORT

Using our internal monitoring systems, we're able to fix issues before they occur.