IT News - MFA

When searching for the most secure method of two-factor authentication (2FA) -- also known as multi-factor authentication (MFA) -- biometrics are often the first to come to mind

Megan Anderson writes in Security Boulevard, "The data is extremely difficult to replicate, and because it's a relatively new technology, methods of bypassing it are still in their infancy. This has led some to wonder whether it's the next generation of identity security. We seek to explore that idea in our list of biometric

Biometric 2FA Overview

Biometric 2FA, or biometric authentication, is a method of verifying a user's identity using a piece of 'who they are' such as their fingerprint, facial features, hand shape, iris structure, voice, or typing behavior (such as how strongly a user depresses keys on their keyboard)..."


How To Evaluate The ROI Of 2FA
Security Boulevard, March 13th, 2020
Two-factor authentication (2FA), also known as multi-factor authentication (MFA), protects user accounts by factoring in something a user has (such as a time-based, one-time password, or TOTP) in addition to what they know (their credentials)

"While 2FA is considered to be a standard in identity security practices today, it can be a headache for some organizations," opines Megan Anderson in Security Boulevard.

"Organizations know it's more secure than only requiring a username and password, but 2FA reduces efficiency and can require the admin to dedicate large portions of time to manual integration and management. When admins spend a lot of their time integrating and managing a tool that slows down the user authentication process to some degree, it can potentially translate into a loss of productivity. As a result, some may question the return on investment (ROI) of 2FA..."


Passcodes from SMS or authenticator apps are better than passwords alone, but hackers can exploit their weaknesses

"You've probably heard this security advice: protect your accounts by using two-factor authentication," opines Stephen Shankland in CNET.

"You'll make life hard for hackers, so the reasoning goes, if you pair a password with a code sent by text message or generated by an app like Google Authenticator.

Here's the problem: It can be easily bypassed. Just ask Twitter Chief Executive Jack Dorsey. Hackers gained access to Dorsey's Twitter account using a SIM swap attack that involves fooling a carrier into switching mobile service to a new phone...."

See all Archived IT News - MFA articles See all articles from this issue