2 Factors of Authentication

two-factor-method-feature1

A little hassle with logging into a system is tremendously worth the amount of security, if that system has information worth securing. I’ve enabled two-factor authentication for services I use. Some services call it two-step authentication, which is a sub-category of two-factor.

For the last few months, with two-factor enabled, it hasn’t really bothered me at all. Except for those times I’m sitting on the couch and my phone is on the charger, just a few feet out of reach. Like trying to reach the remote when you’re lying on the couch and infomercials are on. You start to question if you really need to change the channel and can you just remain comfortable and try to believe in the product that is missing from your life.

  • Single-factor authentication: examples are PIN or password.
  • Two-factor authentication: Single-factor plus a software or hardware-generated token code, or a card that is magnetic or smart.
  • Two-step authentication: Single-factor plus a code sent to the user out-of-band.

Here are some services that offer two-step.

Go enable them and feel a little more confident in the security of some services you use!

This entry was posted in Security Blog and tagged , , . Bookmark the permalink.