1.5 min readBy Published On: October 10, 2022Categories: Cybersecurity News

Multi-Factor Authentication, or MFA, makes it twice as hard for cybercriminals to access your online accounts.

“Simply put, MFA should be just about everywhere!”

What can Multi-Factor Authentication include?

  • An extra PIN (personal identification number)
  • The answer to an extra security question like, “What’s your favourite pet’s name?”
  • An additional code, either emailed to an account or texted to a mobile number
  • A biometric identifier like facial recognition or a fingerprint
  • A unique number generated by an “Authenticator App”
  • A secure token, which is a separate piece of hardware (like a key fob that holds information), that verifies a person’s identity with a database or system

What is Multi-Factor Authentication?

Referred to as MFA, Multi-Factor Authentication (or Two-Factor Authentication) is a secure login process that requires an additional identification level before providing access to an account or service. To log in, you must enter a second code after providing your account and password details.

The code can be sent through a connected email address, to a phone number via text, or it’s accessible through an authentication app, like Google Authenticator. You cannot get in without the code, even if you enter the correct username and password.

What accounts have MFA?

Not every account offers MFA, but it’s becoming more popular. It’s seen on many accounts that usually hold either valuable financial or personal information, like banks, financial institutions, online stores, or social media platforms.

Any place online that is storing your personal information (especially financial information), or any account that can be compromised and used to defraud someone else should be protected with MFA.

Simply put, MFA should be just about everywhere!

Follow along the SMB Solutions Cloud Services blog page as we continue highlighting the focus topics of this year’s Cybersecurity Awareness Month.

Content originally sourced from SAP Business One Community page.

Leave A Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.