Two Factor Authentication Explained

Everyone wants to protect their privacy especially in a World where cybercrime is becoming a major problem. In this blog we are going to explain what a two factor authentication (two-step authentication) is and how it works.

Two Factor Authentication Explained

Everyone wants to protect their privacy especially in a World where cybercrime is becoming a major problem. In this blog we are going to explain what a two factor authentication (two-step authentication) is and how it works.

So What Is It?

AVG described two-factor authentication (2FA) as a security measure that adds a second layer of protection in addition to your password. 2FA is implemented to protect both a user's credentials as well as the resources that they can access. 2FA makes it harder for attackers to gain access to a persons devices or online accounts because even if they know your password they still have to pass the authentication check.

How Does It Work?

There a few 2FA methods ranging from a physical security key to the Google authentication app. You can even get a one-time numeric code either by SMS or voice call.

So here is how it works, if you want to access an account you would enter your login details as normal and click submit. The online service then sends an automated request for a second piece of information (an SMS with a verification code, a Google authentictor prompt or something else that you have set up. You will only get access to your account when your identity has been confirmed with this second piece of information.

The Three Factors

The additional layer of security will generally be one of the following basic factors:
1. Something you know (a pin code)
2. Something you have (a security token that you can get via an app like Google Authenticator)
3. Something you are (biometric data such as fingerprint or facial scan)

Airplane Mode
Airplane Mode Explained: Is It Really Necessary?
Learn all about Airplane Mode, its purpose, and why it's important to use it on your smartphone or laptop while on a flight. Understand how it helps prevent interference with aircraft communication and navigation systems.
3-2-1 Backup Method
3-2-1 Backup Method: All You Need to Know
In this blog post we’ll take a deeper look at the 3-2-1 backup method, covering why it’s used, benefits, implementation and best practices.
Password Attacks
The Different Types of Password Attacks and How to Prevent Them
In this blog, we will look at the different types of password attacks that attempt to compromise your sensitive information. We also share some important advice for preventing these attacks in order to improve your overall security and effectively protect your data.

© Edmondson's IT Services | Co. Reg. No: 07818717 | VAT Reg. No: GB122507059

pay nothing for 3 months

Get 3 months of IT support at no extra cost, by signing up to a 12 month contract.

pay nothing for 3 months on your IT support

what's included

BESPOKE SUPPORT

We offer a completely customised service to support your business.

PRICE MATCH GUARANTEE

We have a price match guarantee in place to ensure you're getting the best service without compromising on quality.

PROACTIVE SUPPORT

Using our internal monitoring systems, we're able to fix issues before they occur.