Blog
2FA, double factors authentication: protect yourself and your data
3 min read

2FA, double factors authentication: protect yourself and your data

As you may have already noticed, multiple factors authentication is now widely used to log in to your favorite personal and professional applications. Even though you find it annoying, it protects you and your data that so we should learn to understand and love it ?.

In this article, we will review in a simple way the characteristics of this process and why it is so important today.

2FA, Double Factors Authentication, what is it?

2 factors authentication (2FA) is a system which proves that you are the person that you pretend to be by testing yourself with two different factors. It’s as if you had two different types of access to your home: a digital door code and a key lock for example. 

This system works by using two different categories of factors which aim to prove that you are you. There are several factors that you may encounter, here are the most used:

  • Knowledge factors: password, PIN code…
  • Biometric factors: fingerprints, facial or voice recognition
  • Possession factors: key, smartphone, mobile app, email…

Possession factors examples (Mr. Robot-like gadgets): a key with number rotation or a biometric key.

Other types of factors may also be used in some cases:

  • Location factors: access to an application is only allowed in certain geographical areas.
  • Time factors: systems may restrict the use of the application only to a specific time window.

Why is 2FA important?

Today, the security of your data is a major issue. Consequences of identity theft on your applications can quickly ruin your life and even cost you a lot.

Two factors authentication systems can block a large part of cyber attacks that you may suffer.

100% brute force attacks blocked (nothing to do with a call to The Rock to access your applications ?). These are programs that can find your password based on a dictionary which lists the common passwords. The system will try them one by one until it finds the right one. It is one of the most common cyber attacks.

76% to 100% phishing and social engineering attacks blocked. You are probably starting to get used to receiving fake but very well made emails asking for your personal data, this is phishing. Social engineering is based on the analysis of your social media to find personal information which could be your password (the name of your cat for instance ?).

The main method to bypass the double factors authentication is heavy and complex: SIM swapping. Someone makes your phone operator believe your smartphone is lost (smartphones are mostly used by 2FA) and intercepts your new SIM card before you receive it. He then changes all your passwords within a few hours and takes control of your applications. 

 

Why do we talk about 2FA?

Webmecanik cares about its client’s growing need for data security. That’s why we offer you the opportunity to set up Double Factors Authentication for your Webmecanik applications: Webmecanik Automation and Webmecanik Pipeline.

Now you understand the importance of protecting you virtually, we hope you’ll use this option available to all our users.

Do you want to know more about the 2FA set up? Read our support article on Two Factors Authentication.

Continuer d’explorer les articles

Webmecanik Automation release

Webmecanik Automation, your favorite marketing automation software, is upgrading to version 4! It is a great moment for our team ?. Discover its functional improvements: tag management, interface improvement, reCAPTACHA V3 and the new landing page builder. It is a big step forward for our automation software which allows you to create custom tables and […]

Generating leads through webinars: the role of marketing automation

Webinars have become an established part of a marketing strategy, especially in a B2B context. These online conferences, that aim to discuss a specific theme, make possible to demonstrate the advantages of a product, to present the values of a company and, above all, to show your expertise. This is part of a content strategy, […]

Give back to the community what the community brings to you, an Open Source philosophy

I wanted to share a few words and thoughts about Open Source. Working for 3 years very closely with the Mautic open source community, I’ve seen people and especially companies behaving differently. And sometimes, it irritates me a little bit to hear “I’m an expert of that community” when those experts never contributed. The advantages […]

Webmecanik Pipeline update may 2023

Discover the latest updates in your Webmecanik Pipeline CRM! Our teams work is devoted to streamline your sales process and help you increase efficiency with minimal effort ? Today, we present a new feature regarding your contact and company lists ? New Feature Bulk Editing of Your Lists Need to quickly select contacts or companies […]

How much does Mautic cost? The true cost of Open Source

Many companies looking for an inexpensive marketing automation solution, embark on the adventure of Open Source with Mautic with the idea that Open Source (open application code) is free. This is partially correct. It is very easy to download the entire code (hosted on GitHub, here is our fork) which technically allows to have the application […]

The key to successful emailing campaigns in B2C

Sending newsletters is still a widely used way of communicating with your audience. To keep it effective and up to date, you need to know all its secrets and good practices. Creative, useful and trustworthy, emailing is a powerful tool to discover your new products or to work on your image. Let’s see how to […]

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.