Blog
2FA, double factors authentication: protect yourself and your data
3 min read

2FA, double factors authentication: protect yourself and your data

As you may have already noticed, multiple factors authentication is now widely used to log in to your favorite personal and professional applications. Even though you find it annoying, it protects you and your data that so we should learn to understand and love it ?.

In this article, we will review in a simple way the characteristics of this process and why it is so important today.

2FA, Double Factors Authentication, what is it?

2 factors authentication (2FA) is a system which proves that you are the person that you pretend to be by testing yourself with two different factors. It’s as if you had two different types of access to your home: a digital door code and a key lock for example. 

This system works by using two different categories of factors which aim to prove that you are you. There are several factors that you may encounter, here are the most used:

  • Knowledge factors: password, PIN code…
  • Biometric factors: fingerprints, facial or voice recognition
  • Possession factors: key, smartphone, mobile app, email…

Possession factors examples (Mr. Robot-like gadgets): a key with number rotation or a biometric key.

Other types of factors may also be used in some cases:

  • Location factors: access to an application is only allowed in certain geographical areas.
  • Time factors: systems may restrict the use of the application only to a specific time window.

Why is 2FA important?

Today, the security of your data is a major issue. Consequences of identity theft on your applications can quickly ruin your life and even cost you a lot.

Two factors authentication systems can block a large part of cyber attacks that you may suffer.

100% brute force attacks blocked (nothing to do with a call to The Rock to access your applications ?). These are programs that can find your password based on a dictionary which lists the common passwords. The system will try them one by one until it finds the right one. It is one of the most common cyber attacks.

76% to 100% phishing and social engineering attacks blocked. You are probably starting to get used to receiving fake but very well made emails asking for your personal data, this is phishing. Social engineering is based on the analysis of your social media to find personal information which could be your password (the name of your cat for instance ?).

The main method to bypass the double factors authentication is heavy and complex: SIM swapping. Someone makes your phone operator believe your smartphone is lost (smartphones are mostly used by 2FA) and intercepts your new SIM card before you receive it. He then changes all your passwords within a few hours and takes control of your applications. 

 

Why do we talk about 2FA?

Webmecanik cares about its client’s growing need for data security. That’s why we offer you the opportunity to set up Double Factors Authentication for your Webmecanik applications: Webmecanik Automation and Webmecanik Pipeline.

Now you understand the importance of protecting you virtually, we hope you’ll use this option available to all our users.

Do you want to know more about the 2FA set up? Read our support article on Two Factors Authentication.

Continuer d’explorer les articles

New rules on cookie management, major change for software and web apps editors

New rules on cookie management, major change for software and web apps editors The tracking protection feature, first launched as a simple protection for private browsing, has recently been modified by Firefox.  In fact, in the recent version 70, this protection is now reinforced in order to increase control by the Internet user by blocking by default […]

Do we really need double opt-in?

Since the enforcement of the GDPR (General Data Protection Regulation), we have heard a lot about the practice of opt-in, which is to obtain people’s consent to be able to send them marketing emails. But in all this, is the double opt-in practice important? First, let’s define what the double opt-in is. It is a […]

What is the impact of Apple’s “Mail Privacy Protection” announcement ?

At the Apple Worldwide Developers Conference 2021 (June 7 to June 11), Apple has announced its new Mail Privacy Protection policy, which does not apply to users of other email applications (Gmail, etc.) even if they use iPhone. This is a new step towards the protection of personal data, which is the logical continuation of […]

Customer loyalty: challenges and examples

Customer loyalty to improve your business, that’s the bet you’ve set yourself? You are in the right place. You will find all the tips to convince your team and your boss of the importance of customer loyalty and the advice to achieve it. Gather your colleagues from communication, marketing and sales, they all have a […]

Mautic raise $5M

Investors Confirm their Confidence in the Mautic Project Mautic is the first open source marketing automation software. Last February founder David Hurley managed to raise seed funding of $600,000. Barely six months later, with a strong team now behind him, the company has achieved Series A funding of $5 million. Webmecanik is the second largest contributor to the […]

Lead scoring: best practices & limitations

Generating leads can be a difficult and time-consuming task for any sales team in any company. Indeed, when the sales team has already identified its leads, they face a new challenge: how to prioritize them? Generally, they trust their instinct and experience to prioritize prospects. As one can imagine, this method is not very precise, […]

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.