Blog
2FA, double factors authentication: protect yourself and your data
3 min read

2FA, double factors authentication: protect yourself and your data

As you may have already noticed, multiple factors authentication is now widely used to log in to your favorite personal and professional applications. Even though you find it annoying, it protects you and your data that so we should learn to understand and love it ?.

In this article, we will review in a simple way the characteristics of this process and why it is so important today.

2FA, Double Factors Authentication, what is it?

2 factors authentication (2FA) is a system which proves that you are the person that you pretend to be by testing yourself with two different factors. It’s as if you had two different types of access to your home: a digital door code and a key lock for example. 

This system works by using two different categories of factors which aim to prove that you are you. There are several factors that you may encounter, here are the most used:

  • Knowledge factors: password, PIN code…
  • Biometric factors: fingerprints, facial or voice recognition
  • Possession factors: key, smartphone, mobile app, email…

Possession factors examples (Mr. Robot-like gadgets): a key with number rotation or a biometric key.

Other types of factors may also be used in some cases:

  • Location factors: access to an application is only allowed in certain geographical areas.
  • Time factors: systems may restrict the use of the application only to a specific time window.

Why is 2FA important?

Today, the security of your data is a major issue. Consequences of identity theft on your applications can quickly ruin your life and even cost you a lot.

Two factors authentication systems can block a large part of cyber attacks that you may suffer.

100% brute force attacks blocked (nothing to do with a call to The Rock to access your applications ?). These are programs that can find your password based on a dictionary which lists the common passwords. The system will try them one by one until it finds the right one. It is one of the most common cyber attacks.

76% to 100% phishing and social engineering attacks blocked. You are probably starting to get used to receiving fake but very well made emails asking for your personal data, this is phishing. Social engineering is based on the analysis of your social media to find personal information which could be your password (the name of your cat for instance ?).

The main method to bypass the double factors authentication is heavy and complex: SIM swapping. Someone makes your phone operator believe your smartphone is lost (smartphones are mostly used by 2FA) and intercepts your new SIM card before you receive it. He then changes all your passwords within a few hours and takes control of your applications. 

 

Why do we talk about 2FA?

Webmecanik cares about its client’s growing need for data security. That’s why we offer you the opportunity to set up Double Factors Authentication for your Webmecanik applications: Webmecanik Automation and Webmecanik Pipeline.

Now you understand the importance of protecting you virtually, we hope you’ll use this option available to all our users.

Do you want to know more about the 2FA set up? Read our support article on Two Factors Authentication.

Continuer d’explorer les articles

Webmecanik Pipeline update – July 2023

You asked for it, and it’s finally live! ?Now you can sort your contacts and companies with new filters available in your Webmecanik Pipeline CRM. ? New Feature Filters for your Contact and Company Lists ? Are you looking to filter your contact and company lists? Today, it’s possible for all Webmecanik Pipeline users. Create […]

Do we really need double opt-in?

Since the enforcement of the GDPR (General Data Protection Regulation), we have heard a lot about the practice of opt-in, which is to obtain people’s consent to be able to send them marketing emails. But in all this, is the double opt-in practice important? First, let’s define what the double opt-in is. It is a […]

New Feature: Track and Optimize Your Sales Margin

From now on, sales representatives and managers can enter and track their sales margins directly from their CRM. This strategic data enhances your analysis and helps you make more informed decisions to optimize your sales performance. Get a New Perspective on your Opportunities Make Strategic Decisions Based on Accurate Data A Feature Designed to Boost […]

ABM, or how to detect commercial opportunities in B2B

Account based marketing is a marketing method used in B2B to detect and target key accounts that are interested in your product. The goal? To enable you to contact qualified leads in a personalised way! I’ll explain to you how I have set it up to generate leads for our sales team! Detect commercial opportunities […]

Webmecanik Automation Updates – September 2023

Summer has been productive at Webmecanik ☀️ Our team has worked hard to bring you some great new features for the end of the year. This September, we are starting off gently with a new anti-bot solution, an alternative to Google reCAPTCHA, and new scoring rules. Stay tuned for more updates! New Feature The new […]

Mautic Open Source vs. Webmecanik Automation: The Choice of Expertise and Sovereignty

The Backbone of Automation Mautic is an essential name in the Marketing Automation universe. As the only major Open Source and royalty-free solution, it represents a powerful alternative to American giants like Hubspot, Marketo, Pardot, or Eloqua. At Webmecanik, we chose Mautic. We are the major contributor of this Open Source project and have built, […]

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.