Two Factor Authentication Explained

Everyone wants to protect their privacy especially in a World where cybercrime is becoming a major problem. In this blog we are going to explain what a two factor authentication (two-step authentication) is and how it works.

Two Factor Authentication Explained

Everyone wants to protect their privacy especially in a World where cybercrime is becoming a major problem. In this blog we are going to explain what a two factor authentication (two-step authentication) is and how it works.

So What Is It?

AVG described two-factor authentication (2FA) as a security measure that adds a second layer of protection in addition to your password. 2FA is implemented to protect both a user's credentials as well as the resources that they can access. 2FA makes it harder for attackers to gain access to a persons devices or online accounts because even if they know your password they still have to pass the authentication check.

How Does It Work?

There a few 2FA methods ranging from a physical security key to the Google authentication app. You can even get a one-time numeric code either by SMS or voice call.

So here is how it works, if you want to access an account you would enter your login details as normal and click submit. The online service then sends an automated request for a second piece of information (an SMS with a verification code, a Google authentictor prompt or something else that you have set up. You will only get access to your account when your identity has been confirmed with this second piece of information.

The Three Factors

The additional layer of security will generally be one of the following basic factors:
1. Something you know (a pin code)
2. Something you have (a security token that you can get via an app like Google Authenticator)
3. Something you are (biometric data such as fingerprint or facial scan)

'}}
9 Ways Technology Can Save Your Business Money and Time
For businesses across the globe, time and money are two of the most valuable resources. Thankfully, technology has made it easier than ever to maximise both. In this blog, we cover 9 ways in which technology can help you save money and time.
'}}
DKIM, SPF, and DMARC: Best Practices for Email Authentication
Email is a crucial communication tool for businesses and individuals alike. However, with the rise of phishing attacks and email fraud, the security and authenticity of email messages have been a growing concern for many. This is where email authentication protocols such as DKIM, SPF, and DMARC come into play.
'}}
10 Common IT Support Help Desk Problems And Their Solutions
Discover the 10 most common IT Support help desk problems and learn expert strategies to resolve them. Keep your business running smoothly and minimise downtime with these expert solutions.

© Edmondson's IT Services | Co. Reg. No: 07818717 | VAT Reg. No: GB122507059

pay nothing for 3 months

Get 3 months of IT support at no extra cost, by signing up to a 12 month contract.

pay nothing for 3 months on your IT support

what's included

BESPOKE SUPPORT

We offer a completely customised service to support your business.

PRICE MATCH GUARANTEE

We have a price match guarantee in place to ensure you're getting the best service without compromising on quality.

PROACTIVE SUPPORT

Using our internal monitoring systems, we're able to fix issues before they occur.