Conversion Hackers
Fealse: Tech News
What Is Multi-Factor Authentication (MFA)?
  • Apps

What Is Multi-Factor Authentication (MFA)?

  • April 28, 2022
  • admin
Total
0
Shares
0
0
0

BestForBest/Shutterstock.com

You’ve heard of two-factor authentication (2FA) and its many benefits, but what about multi-factor authentication (MFA)? MFA can go beyond a simple text or authentication app, and might even happen without you knowing it.

MFA Can Involve 2FA

Two-factor authentication is a subset of multi-factor authentication. So the core definition of both is essentially the same. MFA simply means that a resource (such as your computer or online account) is secured by more than one type of credential.

The reasoning behind MFA is that there’s an exponential reduction in the odds of someone compromising all of the authentication factors you need, especially if they’re very different in nature.

The most common type of MFA is two-factor authentication with a password and a code sent via SMS texts or through a dedicated authentication app, but different services mix and match factors as required.

Types of MFA

Authentication factors can be broadly sorted into knowledge, possessions, and inherent unique attributes.

Factors that you know include passwords, PINs, the answers to security questions, and so on. These are often the most vulnerable to being compromised because they can be stolen or, in some cases, guessed by brute force.

Authentication factors you possess are objects like keys, RFID cards, and devices like computers and smartphones. To compromise this factor you need to either steal the object or make a perfect copy of it without the owner noticing.

Inherent factors are things that are unique to you, but can’t be changed. These are mostly biometric factors such as your fingerprints or iris patterns, but can also include voice matching, facial recognition, and many other similar options.

Hidden Authentication Factors

There are also authentication factors that you don’t even know about but are used silently to verify your access. For example, the GPS location of your phone, the MAC address of your network adapter, or your browser fingerprint. You may never know that this is being checked, but when an unauthorized user without that hidden factor tries to gain access, they’ll be blocked.

Risk-Based Authentication

Speaking of hidden authentication factors, this ties in with risk-based authentication. This is a practice where you usually only need 2FA or even one factor to access your resources, but if something out of the ordinary happens additional factors are required.

Maybe you’re in a different country or trying to log in from a computer you’ve never used before. The authentication system picks up on violations of your usual patterns and takes action by asking for more proof that you’re really who you say you are.

How Many Factors Do You Need?

If you’re currently using 2FA to secure your online accounts or other resources, should you be using MFA with more than two factors? As we’ve seen, you may actually already benefit from MFA without knowing it. There are some cases, though, where you might want to consider adding more factors or changing factors if possible.

If you’re using SMS-based verification codes, you should consider switching to an authenticator app if the service offers one. Thanks to a hacker’s ability to clone SIM cards, SMS is not the most secure second factor.

Keep in mind that while adding more factors does significantly raise the security level of access control, it also introduces more work for you. Additionally, if you misplace some of your factors, you could be significantly inconvenienced.

As such, we recommend that the average user sticks to 2FA with a few backup factors in the event you’re locked out or need to have extra protection in high-risk scenarios. Some password managers can help you with this, and you should be using one regardless.



Total
0
Shares
Share 0
Tweet 0
Pin it 0
admin

Previous Article
Rogue Lords
  • Games

Play as the Devil in Rogue Lords Available Today on the Xbox Store

  • April 28, 2022
  • admin
View Post
Next Article
Okta vs Ping: IAM Software Comparison
  • Apps

Okta vs Ping: IAM Software Comparison

  • April 28, 2022
  • admin
View Post
You May Also Like
This Missing Pixel 6a Feature Doesn’t Matter – Review Geek
View Post
  • Apps

This Missing Pixel 6a Feature Doesn’t Matter – Review Geek

  • admin
  • May 20, 2022
Deadbolt ransomware attacks QNAP NAS users yet again
View Post
  • Apps

Deadbolt ransomware attacks QNAP NAS users yet again

  • admin
  • May 20, 2022
android-zero-day-vulnerability-news
View Post
  • Apps

Packaged zero-day vulnerabilities on Android used for cyber surveillance attacks

  • admin
  • May 20, 2022
Why I Prefer an eReader to a Real Book
View Post
  • Apps

Why I Prefer an eReader to a Real Book

  • admin
  • May 20, 2022
Radeon Preview Driver 2022: Performance Boost or Not?
View Post
  • Apps

Radeon Preview Driver 2022: Performance Boost or Not?

  • admin
  • May 20, 2022
Apple says Meta
View Post
  • Apps

Apple executives show VR/AR headset to board, signaling advanced progress

  • admin
  • May 19, 2022
New Justice Department guidelines promise not to prosecute security researchers under anti-hacking laws
View Post
  • Apps

New Justice Department guidelines promise not to prosecute security researchers under anti-hacking laws

  • admin
  • May 19, 2022
visio-there-now-free-some
View Post
  • Apps

Visio: From a simple IT tool to the universal business diagram app it was always meant to be

  • admin
  • May 19, 2022

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories
  • Apps
  • Games
  • How To
  • News
  • Photography
  • Reviews
  • Security

Input your search keywords and press Enter.