Two Factor Authentication Explained

Everyone wants to protect their privacy especially in a World where cybercrime is becoming a major problem. In this blog we are going to explain what a two factor authentication (two-step authentication) is and how it works.
Two Factor Authentication

Two Factor Authentication Explained

Everyone wants to protect their privacy especially in a World where cybercrime is becoming a major problem. In this blog we are going to explain what a two factor authentication (two-step authentication) is and how it works.

So What Is It?

AVG described two-factor authentication (2FA) as a security measure that adds a second layer of protection in addition to your password. 2FA is implemented to protect both a user's credentials as well as the resources that they can access. 2FA makes it harder for attackers to gain access to a persons devices or online accounts because even if they know your password they still have to pass the authentication check.

How Does It Work?

There a few 2FA methods ranging from a physical security key to the Google authentication app. You can even get a one-time numeric code either by SMS or voice call.

So here is how it works, if you want to access an account you would enter your login details as normal and click submit. The online service then sends an automated request for a second piece of information (an SMS with a verification code, a Google authentictor prompt or something else that you have set up. You will only get access to your account when your identity has been confirmed with this second piece of information.

The Three Factors

The additional layer of security will generally be one of the following basic factors:
1. Something you know (a pin code)
2. Something you have (a security token that you can get via an app like Google Authenticator)
3. Something you are (biometric data such as fingerprint or facial scan)

Phishing and blagging
The Difference Between Blagging and Phishing
Phishing and blagging are both forms of cyber attacks that are designed to trick people into handing over their sensitive information.
Yealink T46 Transfer
How Safe Is Public WiFi?
The question of how safe it is to use public WiFi remains a significant concern in terms of cybersecurity. Understanding the risks associated with connecting to these networks and implementing safety measures is crucial for protecting your personal information online.
Chatgpt vs Microsoft Copilot
ChatGPT vs Microsoft Copilot
In the past few months, we’ve seen a rise in Artificial Intelligence (AI), leading to the emergence of lots of new AI tools and software. Two big players in this field are Microsoft Copilot and ChatGPT. These two tools have been a driving force in increasing innovation within this field.

© Edmondson's IT Services | Co. Reg. No: 07818717 | VAT Reg. No: GB122507059

pay nothing for 3 months

Get 3 months of IT support at no extra cost, by signing up to a 12 month contract.

pay nothing for 3 months on your IT support

what's included

BESPOKE SUPPORT

We offer a completely customised service to support your business.

PRICE MATCH GUARANTEE

We have a price match guarantee in place to ensure you're getting the best service without compromising on quality.

PROACTIVE SUPPORT

Using our internal monitoring systems, we're able to fix issues before they occur.