The importance of two-factor authentication

Padlock graphic with security form hovering over laptop - two-factor authentication
(Image credit: Shutterstock / song_about_summer)

For years, the dangers of protecting online accounts with only basic, password based, authentication have been known. Yet, despite this, the transition to stronger forms of authentication has been slow. As consumers and businesses become wiser to the imperative of better protecting their accounts, their voices will add to those calling for two- and multi-factor authentication (2FA/MFA).

About the author

John Gilbert is General Manager for UK&I at Yubico.

The National Cyber Security Centre (NCSC) recommends 2FA for ‘high value’ and email accounts, as email provides a route in for cybercriminals to reset passwords on other accounts. In the UK, regulation governs strong customer authentication (SCA) in the high-risk finance sector. Meanwhile, Twitter has announced that its users now have the option to use security keys as their sole 2FA method.

It’s an important step towards a truly passwordless future and one which puts pressure on other organizations to assess their own authentication protocols and, where necessary, boost protection for customers and users.

Why 2FA?

Strong authentication is necessary to increase access cybersecurity for accounts and online services. Passwords alone provide weak protection because they can be guessed and phished and, once stolen, tried against a range of accounts in the hope of securing a hit.

Unfortunately, our own behavior makes a lot of this possible. People have many online accounts. To make it possible to remember all their passwords they choose simple ones which, in the worst-case scenario, can be easily guessed. What’s more they reuse them, so much so that our own research revealed 54 per cent of employees use the same passwords across multiple work accounts. To keep track of passwords, over a fifth (22 per cent) admit to writing them down. Password reuse enables credential stuffing, in which log-in information is entered into a range of digital services, often by an automated system or program. This type of en masse attack can yield results when people reuse the same credentials, rendering a range of accounts susceptible to breaches and takeovers.

A password is something someone knows and therefore it can be shared. Astonishingly, people sometimes do this knowingly and willingly, particularly in business settings when colleagues need to access a little-used system or application. Beyond this type of intentional sharing, passwords can also be tricked out of people through phishing. Phishing attacks are becoming increasingly sophisticated and therefore difficult to spot. An email may appear to be from a legitimate service provider, such as a bank, yet when the unwitting customer clicks on a link they could be taken to a fake site. If they enter their information at this point, the cybercriminal is able to use the phished credentials on the actual service provider’s site to gain access to the user’s account.

Even more sophisticated, and another danger to password-only protection, are man-in-the-middle (MiTM) attacks. These come about when a cyberattacker is in the middle of communications between a service user and provider, both of whom believe they are communicating with each other. As with phishing, highly personalized messages provide a vehicle for MitM attacks, as do unprotected Wi-Fi networks and manipulated URLs that look like legitimate sites.

The working-from-home effect

For many businesses, hybrid remote/office working environments add to the urgency to strengthen authentication practices. It is likely that many people will continue to work from home, at least some of the time, despite the return to offices. A range of organizations have already indicated plans to continue supporting a flexible approach. This means expanded corporate IT estates – comprising many more devices accessing networks, systems and applications from many more places – will become commonplace.

The time when security was focused at the corporate perimeter now seems further and further behind us. Now, companies must mitigate security risks and protect access at the device and application level. Yet, despite 2FA technology being the best line of defense to protect against account takeovers, only 22 per cent of respondents to our research into cybersecurity in the work-from-anywhere-era, say their company has introduced it since the pandemic began.

Strong and convenient 2FA

2FA strengthens authentication because it adds another factor – something the user has (such as a one-time passcode or security key) or something they are (a unique physical attribute such as a fingerprint) – to the something they know (usually a username and password).

Strong authentication, through tools such as hardware security keys, bolster security without inconveniencing the user. This is a key consideration for both business-to-business (B2B) and business-to-consumer (B2C) organizations. OTPs, often sent by text, whilst popular as a second line of defense, aren’t completely resistant to SIM-swap, modern phishing or MitM attacks. What’s more, they can create friction in the log-in process and stall it altogether if the battery in the registered mobile phone needs charging, the user is in a mobile-restricted location, or there’s a signal strength issue.

The humble password, our primary line of online defense for so long, is ill-equipped to deal with the range of threats it now faces. Added to that, its usability has significantly waned since the number of accounts we all manage has proliferated to such a degree that password management is a very real problem. Only through a wider understanding and implementation of stronger forms of authentication, will business and consumer accounts, services and applications realize the higher levels of protection they deserve.

John Gilbert

John is General Manager UK&I at Yubico.

He is a proven and effective Sales Leader/Sales Professional with a consistent record of achievement over 25 years in the industry. Strong record in B2B Solution Sales, Relationship Management and Team Leadership at VP/Director level. Results oriented and new business focused, he has sold both Direct and through Channel Sales throughout the UK and EMEA using both strategic, tactical and what is now being championed as “challenger” sales methodologies. He develops strong, long-term and profitable customer relationships at both Operational and C Level and he enjoys the challenge of driving innovation, disruptive and “early adopter” sales cycles.

Read more
Person using finger print authentication
Passwords out, passkeys in: The future of secure authentication
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
Security padlock in circuit board, digital encryption concept
MFA alone won’t protect you in 2025: the new cybersecurity imperative
Representational image of a shrouded hacker.
Getting to grips with Adversary-in-the-Middle threats
digital key
Microsoft really wants users to ditch passwords and switch to passkeys
password manager
I'm a security expert - here are my biggest tips for creating a secure password for work and home life to stay safe online
Latest in Security
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
Nation-state threats are targeting UK AI research
Scam alert
Fake jobs and phone calls: How Americans lost $12.5 bn to fraud in 2024
Application Security Testing Concept with Digital Magnifying Glass Scanning Applications to Detect Vulnerabilities - AST - Process of Making Apps Resistant to Security Threats - 3D Illustration
Google bug bounty payments hit nearly $12 million in 2024
Scam alert
A new SMS energy scam is using Elon Musk’s face to steal your money
Representational image of a cybercriminal
Allstate sued for exposing personal customer information in plaintext
Latest in News
Vision Pro Metallica
Apple Vision Pro goes off to never never land with Metallica concert footage
Mufasa is joined by another lion, a monkey and a bird in this promotional image
Mufasa: The Lion King prowls onto Disney+ as it finally gets a streaming release date
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
An Nvidia GeForce RTX 4060 on a table with its retail packaging
Nvidia RTX 5060 GPU spotted in Acer gaming PC, suggesting rumors of imminent launch are correct – and that it’ll run with only 8GB of video RAM
Indiana Jones talking to a friend in a university setting with a jaunty smile on his face
New leak claims Indiana Jones and the Great Circle PS5 release will come in April
A close up of the limited edition vinyl turntable wrist watch from AndoAndoAndo
This limited-edition timepiece turns the iconic Technics SL-1200 turntable into a watch, and I want one