Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Alerts»Why is Two-Factor Authentication (2FA) Important?
    Alerts

    Why is Two-Factor Authentication (2FA) Important?

    By Michael Del-Llano SuberviOctober 11, 20223 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Two-Factor Authentication or as it’s commonly known, 2FA, is another way to verify that you are actually the person who you say you are even after you’ve logged in once already. Hence the name, Two-Factor Authentication.

    Phone Number Two-Factor Authentication

    You might already have a form of 2FA established on some of your accounts and didn’t even realize that there was a term for it. An example would be if you’re logging into your email account and it asks for you to input a code from your phone to complete the login process even though you’ve already entered your password. The pin number is an example of Two-Factor Authentication. Most people carry a phone around with them and it is a reliable way to verify that a user is who they say they are.

    While using your phone number as a 2FA method is reliable, a string of attacks known as SIM Swaps that have been known to compromise users even with two factor authentication. A SIM Swap attack is when a cybercriminal physically changes out your SIM card into a phone they own, or, they transfer your number onto another SIM card through malicious use of your personal information and impersonate you to your phone carrier to conduct the swap.

    Authenticator App Two-Factor Authentication

    Although phones are a common way to verify a person’s identity, there are other forms of 2FA that you can set up on your accounts. Another 2FA method is an authenticator app. Google Authenticator and Duo Mobile are two commonly known authenticator apps that are often used by Fordham University. These authenticator apps have timed codes that reset about every fifteen seconds and require you to enter the code to the associated account’s 2FA input menu. These authenticator apps are a step up from receiving a code from your phone as the codes reset very often and you can even set a pin on the authenticator app so that only you can access it in case someone got into your phone.

    Two-Factor Authentication Key

    My personal favorite and the one that I personally use and feel is the most secure, is a physical key called a Two-Factor Authentication Key. This key allows you to log in to an account and have to physically plug the key into your device to allow you to log in. If your account has been compromised and an attacker has your password and they attempt to log in, they will not be able to as long as you have this physical key as your primary Two-Factor Authenticator. A huge benefit is that now you have a physical key for 2FA, it can’t be compromised via the Internet, and you will know its location at all times.

    Source: https://www.cisa.gov/mfa

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Alerts Cybersecurity Awareness Month Tip Cybersecurity Month Device Information Security Guides Mobile Multi-Factor Authentication
    Previous ArticleSpam: How to Limit How Much You Get
    Next Article iOS Security Practices

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d