{"id":5036,"date":"2014-06-09T10:00:05","date_gmt":"2014-06-09T14:00:05","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=5036"},"modified":"2022-11-03T08:26:51","modified_gmt":"2022-11-03T12:26:51","slug":"what_is_two_factor_authentication","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/what_is_two_factor_authentication\/5036\/","title":{"rendered":"What is Two-Factor Authentication? Where Should You Use It?"},"content":{"rendered":"<p>We\u2019ve recorded <a href=\"https:\/\/www.kaspersky.com\/blog\/podcast-two-factor-authentication\/\" target=\"_blank\" rel=\"noopener nofollow\">podcasts<\/a> about it. We\u2019ve discussed it at length in a number of screencasts (which I have kindly embedded below). We\u2019ve mentioned it indirectly in countless articles. But we\u2019ve never taken the time to dedicate an article solely to explaining what two-factor authentication is, how it works, and where you should use it.<\/p>\n<h2>What is Two-Factor Authentication?<\/h2>\n<p>Two-factor authentication is a feature offered by a number of online service providers that adds an additional layer of security to the account login process by requiring that a user provide two forms of authentication. The first form \u2013 in general \u2013 is your password. The second factor can be any number of things. Perhaps the most popular second factor of authentication is the SMS or email code. The general theory behind two-factor is that, in order to log in, you must know something and possess something. Thus, in order to access your company\u2019s virtual private network, you might need a password and a USB stick.<\/p>\n<div class=\"pullquote\">Two-factor is no panacea to prevent account hijacks, but it\u2019s a formidable barrier to anything that would try to compromise an account protected by it.<\/div>\n<p>Two-factor is no panacea to prevent account hijacks, but it\u2019s a formidable barrier to anything that would try to compromise an account protected by it. I think it is pretty well known that passwords are severely flawed: weak ones are easy to remember and easy to guess; strong ones are hard to guess but hard to remember. Because of this, people\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/two-million-passwords-have-been-stolen-what-about-yours\/\" target=\"_blank\" rel=\"noopener nofollow\">who are already bad at creating passwords<\/a>, use the same ones over and over again. Two-factor at least makes it so an attacker would have to figure out your password <em>and<\/em> have access to your second factor, which would generally mean stealing your cell phone or compromising your email account.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>What is two-factor authentication and where should you enable it? #security #passwords<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fo22c&amp;text=What+is+two-factor+authentication+and+where+should+you+enable+it%3F+%23security+%23passwords\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>There\u2019s been a race to replace passwords, but nothing has emerged. As it stands, a good two-factor authentication system is about the best protection you can have. The second benefit to two-factor authentication systems, especially the ones that involve the reception of email and SMS passcodes, is that they let you know when someone has guessed your password. As I\u2019ve said probably 1000 times, if you receive a two-factor authentication code on your mobile device or in your email account and you weren\u2019t trying to login to the account associated with it, that\u2019s a pretty good sign that someone has guessed your password and is attempting to hijack your account. When or if this ever happens, it\u2019s probably a good time to go ahead and change your password.<\/p>\n<h2>On What Accounts Should I Enable Two-Factor?<\/h2>\n<p>The simple rule regarding when and where you should enable two-factor is this: If the service in question offers it and you deem that account valuable, then enable it. So, Pinterest? I don\u2019t know. Maybe. If I had a Pinterest account I probably wouldn\u2019t be willing to go through the hassle of entering two authenticators every time I go to log in. However, your online banking, primary and secondary email (especially if you have <a href=\"https:\/\/www.kaspersky.com\/blog\/a-holistic-approach-to-online-security\/\" target=\"_blank\" rel=\"noopener nofollow\">a dedicated account recovery email address<\/a>), valued social networks (Facebook and Twitter perhaps), and definitely your <a href=\"https:\/\/www.kaspersky.com\/blog\/good-news-and-bad-news-as-apple-adds-two-factor-authentication\/1504\/\" target=\"_blank\" rel=\"noopener nofollow\">AppleID or iCloud<\/a> or whatever account controls your Android device, if you have one, should all be protected by a second factor of authentication.<\/p>\n<p style=\"text-align: center\"><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/APLl2fPAH2g?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p style=\"text-align: center\"><em>Watch this video demonstrating how to set up two-factor for iCloud<\/em><\/p>\n<p>Obviously you would want to consider requiring that second factor for any work-related accounts as well. If you manage websites, you\u2019ll want to consider locking down your registration service account, whether it\u2019s WordPress or GoDaddy or NameCheap or some other. We also recommend turning it on for any account that may have a credit or debit card associated with it: PayPal, eBay, eTrade, etc. Again, your decision to turn on two-factor should be based on how devastating it would be to lose access to any account that offers the feature.<\/p>\n<p style=\"text-align: center\"><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/zzqK_3JOnKM?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p style=\"text-align: center\"><em>This video demonstrates how to set up two-factor on Facebook<\/em><\/p>\n<p>\u00a0<\/p>\n<h2>Are There Any Other Forms of Two-Factor?<\/h2>\n<p>Thus far, we have discussed two-factor as a code sent to your mobile device or email account and as a USB stick often used for VPN access along with a password. There are also keychain code generators, like RSA\u2019s SecureID, which are generally used in corporate environments. At this point, these are the predominate forms of two-factor. However, there are certainly others as well.<\/p>\n<p>Transaction authentication numbers (TAN) are a bit of an old fashioned second factor form. They were popular in Europe, and I have never actually used one myself, but if I understand correctly, your bank would send you a list of TANs (on paper) and every time you performed a transaction online you would enter one of those TANs to authenticate it. The ATM is another old-school example of two-factor authentication. The thing you know if your PIN; the thing you possess is your debit card.<\/p>\n<p>From paper to the future, there has been much buzz about biometric two-factor. Some systems require a password and a fingerprint, iris scan, <a href=\"https:\/\/www.kaspersky.com\/blog\/heartbeat-authentication\/\" target=\"_blank\" rel=\"noopener nofollow\">heartbeat<\/a>, or some other biological measure.<\/p>\n<p>Wearables are gaining momentum too. Some systems require you to wear a special bracelet or other accessory with some sort of embedded radio frequency chip. I have read research papers about electromagnetic tattoos that could be used for a second factor of authentication.<\/p>\n<p>Both Google and Facebook have mobile application code generators, which let users create their own one-time password in place of an SMS or email code.<\/p>\n<p style=\"text-align: center\"><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/5owZhCOge00?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p style=\"text-align: center\"><em>This video demonstrates how to set up two-factor on Gmail<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?<\/p>\n","protected":false},"author":42,"featured_media":5037,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[1218,187,97],"class_list":{"0":"post-5036","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-2fa","9":"tag-passwords","10":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what_is_two_factor_authentication\/5036\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what_is_two_factor_authentication\/3578\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what_is_two_factor_authentication\/3473\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/what_is_two_factor_authentication\/3906\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what_is_two_factor_authentication\/4109\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/what_is_two_factor_authentication\/3891\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what_is_two_factor_authentication\/5036\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what_is_two_factor_authentication\/5036\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/passwords\/","name":"passwords"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5036"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5036\/revisions"}],"predecessor-version":[{"id":46020,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5036\/revisions\/46020"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5037"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}