What is Two Factor Authentication?

Share This Post

[youtube https://www.youtube.com/watch?v=8TLVe15tuC4&w=560&h=315]

What is Two Factor Authentication?


One of the easiest, cheapest and best ways to increase your IT security is to use something called 2FA – or two-factor authentication.


2FA is also known as MFA (multi-factor authentication) or OTP (one-time password).


What does 2FA do?


Two-factor authentication adds a second layer of security to most of your commonly used applications.


If you have a bank account, you’ve probably been using 2FA for a few years. When you log into your bank account, you enter your username, password and then the 6-digit code that appears on a physical keyfob that the bank provides. This is 2FA, but what lots of people don’t know is that you can use it for pretty much everything online.


Let’s think about why 2FA is so good. Let’s take the example of Amazon. If someone steals your password for they could log into your Amazon account and order lots of expensive products!


If you had 2FA enabled on your Amazon account then to login to Amazon you would use your username, password and have a 6-digit code delivered to a free app on your Smart Phone. If someone had your password they still wouldn’t be able to login, because they wouldn’t have your Smart Phone.


How much does 2FA cost?


The best thing about 2FA is that it’s free!


You can use an app on your smart phone such as Google Authenticator, or my personal favourite is Authy.


If you want to get started with 2FA, consider enrolling on my free online course where you can watch over my shoulder whilst I make myself 10 times more secure!

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

How quickly should you get your IT problems fixed?
IT Security

How Quickly Should Your IT Problems Get Fixed?

IT Problems are probably one of the most frustrating things that can happen within your business. What are you to do when you’ve got deadlines to meet, or you’re working from home and can’t access anything? Are you then expected to contact your IT support and wait? How long should you wait? The answers to

Hackers are Beating Multi-Factor Authentication

Just when your thought your cloud applications were secure by implementing multi-factor authentication, hackers are developing strategies to beat this defence. If you didn’t already know, Multi-factor authentication is an essential part of your IT security for logging into your devices and cloud applications. With multi-factor authentication, you need to enter your username and password

Scroll to Top