Two factor authentication (2FA) is also known as 2-step verification. 2FA is NOT going to get your website ranked, but it will likely keep your website safe from intruders as well as all of your other digital accounts requiring a password.
Two factor authentication relies on the users knowledge and/or possession of "2" pieces of unique identifying information.
This post corresponds to our latest podcast episode of "RussandRandy.com" - a podcast from doctors for doctors on Healthcare and Medical Internet Marketing. We hope you like:
"Two Factor Authentication (2FA)"
Two factor authentication (aka two step authentication) is a common method to increase the security of our online accounts. 2FA involves the use of password and a second step to insure the identity of the person requesting authorization to log into the account.
Two factor Authentication
There are 3 ways to prove your identity:
- Something you know
- Something you have
- Something you are
Something You Know - Passwords
Use of a password is one step authentication. Use of a password relies on something you know.
Passwords need to be updated regularly and are stored locally wherever you are logging in (your bank, Facebook, your website). In short they can be either figured out, stolen (hackers) or by a server breach (Target, Facebook, etc.).
Something You Have
This is also known as the possession factor. Before cell phones became ubiquitous, companies would issue secure key chain fobs which generated a unique number. This number changed every 30 seconds or so and would need to be entered by the user, in addition to the password, every login.
Text (SMS) messaging has replaced the keychain fobs. A code is now commonly texted to the users cell phone. This code must be entered at the time of login and expires after a very short time. Text messaging and similar apps which generate codes on your phone are the most common method used today.
Users enter the password and code to prove their identity.
Cell phones are terrific because most of us are always within reach of our phone.
Something You Are
Fingerprints, retina scans, iris scans, DNA and voice are examples of biometric information used to prove your identity. This information is unique to each individual.
One drawback about using biometric information is that it can’t be changed if lost or stolen.
Common examples of biometric authentication include Touch ID and Face ID on Apple iphones where users can unlock their phone with either a fingerprint or glance of your face.
Use of 2FA increases the security of your website and other digital accounts. While it may not get your website ranked, employing 2FA across all your accounts (where available) reduces the amount of wasted time spent trying to correct a hack.
BTW - I use a password manager to handle the dozens and dozens of personal accounts and client accounts requiring passwords. Password managers store and automatically fill in userid and pw with just a click. This allows you to more easily use safe and secure passwords and decreases the chances of theft by keylogging programs, etc.
See you next week!
Subscribe to "RussandRandy.com"
If you have questions or concerns, please leave a comment here. Please download us on iTunes and leave a review. You can also subscribe on any of the platforms listed below.
All the best!
Healthcare and Medical Internet Marketing
Healthcare’s Rx for Web and Social