{"id":914,"date":"2021-08-04T08:33:08","date_gmt":"2021-08-04T13:33:08","guid":{"rendered":"http:\/\/hirehconsulting.ca\/demo\/canquest\/?p=914"},"modified":"2024-02-27T14:10:24","modified_gmt":"2024-02-27T19:10:24","slug":"what-is-two-factor-authentication-and-why-do-we-need-it-blog","status":"publish","type":"post","link":"https:\/\/hirehconsulting.ca\/demo\/canquest\/what-is-two-factor-authentication-and-why-do-we-need-it-blog\/","title":{"rendered":"What is Two-Factor Authentication and Why do we Need it? &#8211; blog"},"content":{"rendered":"<p>Over the years we\u2019ve grown to understand the importance of passwords\u2026 especially good passwords. In fact, most web portals and platforms don\u2019t even allow us to use something simple like \u201c1234\u201d any more. Instead, we have a dictated set of characters to use, and need to add numbers or other symbols to improve their security.<\/p>\n<p>This begs the question; with our emails, banking, and favourite apps protected by a tough password, is two-factor authentication necessary? And if so, what is it and what makes it better? This guide should answer all your questions about two-factor authentication, including why we need it.<\/p>\n<h3>WHAT IS TWO-FACTOR AUTHENTICATION?<\/h3>\n<p>Also known as \u201c2FA\u201d and \u201ctwo-step authentication\u201d; two-factor authentication is a necessary security measure that doubles your password protection. Think of it as an additional layer of security. With two-factor authentication you need to provide multiple pieces of information to access an account. If hackers collect one piece of information (such as a password), then they still need a second piece of information to gain access.<\/p>\n<h3>WHY DO WE NEED TWO-FACTOR AUTHENTICATION?<\/h3>\n<p>Cyber criminals are getting smarter every day. Techniques such as \u201cpassword spraying\u201d (where a long list of the most common passwords can be applied quickly to many accounts) are still successful at cracking weak passwords. Other techniques used by hackers include:<\/p>\n<ul>\n<li>Creating a data breach with a large organization, giving hackers access to millions of usernames and passwords, as well other sensitive data. Cyber criminals sell these lists to other hackers, sharing and spreading your security information even further.<\/li>\n<li>It\u2019s still common to find spyware on many personal and commercial computers. This malicious software can log your keystrokes, recording everything you\u2019ve typed, including usernames and passwords.<\/li>\n<li>A social engineering scam that people are still being tricked into is phishing. This is when you access a website or email that you think is legitimate, such as your bank, but you\u2019ve been redirected to a fake (identical) site that captures your information as you attempt to log in.<\/li>\n<\/ul>\n<p>These three examples are the most common on a long list of hacking techniques. The reason they\u2019re so common is because anyone, no matter how smart and safe they are, can fall victim to them. In some cases, such as having your information lost in a large, corporate data breach, it\u2019s completely out of our control.<\/p>\n<h3>HOW DOES TWO-FACTOR AUTHENTICATION WORK?<\/h3>\n<p>As we mentioned, 2FA requires at least two different types of information. The types of information required depends on the organization you\u2019re creating an account with. If you were setting up a Gmail account, for example, you have three choices for supplying confirmation of identification:<\/p>\n<ol>\n<li>A physical security key (which some phones have built-in). You can also buy a Titan Security Key from the Google store, or other retailers. A \u201cbox of keys\u201d is usually $25.<\/li>\n<li>The Google Authenticator is a free app you can install on your device. When you sign into your email on your computer, for example, you\u2019ll get a prompt on your phone that you tap to confirm.<\/li>\n<li>Verification codes are popular among many platforms and online services. This is where the account sends you a one-time code, usually numeric, that you use to confirm your identity.<\/li>\n<\/ol>\n<p>The Government of Canada is also promoting two-factor authentication. They\u2019re not just encouraging it for their platforms, but every account you need to sign in to. They offer a quick, informative video that helps explain <a href=\"https:\/\/www.getcybersafe.gc.ca\/en\/resources\/video-multi-factor-authentication\" target=\"_blank\" rel=\"noopener\">the importance of two-factor authentication here.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the years we\u2019ve grown to understand the importance of passwords\u2026 especially good passwords. In fact, most web portals and platforms don\u2019t even allow us to use something simple like \u201c1234\u201d any more. Instead, we have a dictated set of characters to use, and need to add numbers or other symbols to improve their security.<\/p>\n","protected":false},"author":1,"featured_media":915,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-914","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/posts\/914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/comments?post=914"}],"version-history":[{"count":2,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/posts\/914\/revisions"}],"predecessor-version":[{"id":2268,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/posts\/914\/revisions\/2268"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/media\/915"}],"wp:attachment":[{"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/media?parent=914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/categories?post=914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hirehconsulting.ca\/demo\/canquest\/wp-json\/wp\/v2\/tags?post=914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}