Blog
2FA, double factors authentication: protect yourself and your data
3 min read

2FA, double factors authentication: protect yourself and your data

As you may have already noticed, multiple factors authentication is now widely used to log in to your favorite personal and professional applications. Even though you find it annoying, it protects you and your data that so we should learn to understand and love it ?.

In this article, we will review in a simple way the characteristics of this process and why it is so important today.

2FA, Double Factors Authentication, what is it?

2 factors authentication (2FA) is a system which proves that you are the person that you pretend to be by testing yourself with two different factors. It’s as if you had two different types of access to your home: a digital door code and a key lock for example. 

This system works by using two different categories of factors which aim to prove that you are you. There are several factors that you may encounter, here are the most used:

  • Knowledge factors: password, PIN code…
  • Biometric factors: fingerprints, facial or voice recognition
  • Possession factors: key, smartphone, mobile app, email…

Possession factors examples (Mr. Robot-like gadgets): a key with number rotation or a biometric key.

Other types of factors may also be used in some cases:

  • Location factors: access to an application is only allowed in certain geographical areas.
  • Time factors: systems may restrict the use of the application only to a specific time window.

Why is 2FA important?

Today, the security of your data is a major issue. Consequences of identity theft on your applications can quickly ruin your life and even cost you a lot.

Two factors authentication systems can block a large part of cyber attacks that you may suffer.

100% brute force attacks blocked (nothing to do with a call to The Rock to access your applications ?). These are programs that can find your password based on a dictionary which lists the common passwords. The system will try them one by one until it finds the right one. It is one of the most common cyber attacks.

76% to 100% phishing and social engineering attacks blocked. You are probably starting to get used to receiving fake but very well made emails asking for your personal data, this is phishing. Social engineering is based on the analysis of your social media to find personal information which could be your password (the name of your cat for instance ?).

The main method to bypass the double factors authentication is heavy and complex: SIM swapping. Someone makes your phone operator believe your smartphone is lost (smartphones are mostly used by 2FA) and intercepts your new SIM card before you receive it. He then changes all your passwords within a few hours and takes control of your applications. 

 

Why do we talk about 2FA?

Webmecanik cares about its client’s growing need for data security. That’s why we offer you the opportunity to set up Double Factors Authentication for your Webmecanik applications: Webmecanik Automation and Webmecanik Pipeline.

Now you understand the importance of protecting you virtually, we hope you’ll use this option available to all our users.

Do you want to know more about the 2FA set up? Read our support article on Two Factors Authentication.

Continuer d’explorer les articles

Dynamic content: features and best practices

Because personalisation needs to go always further, new features have appeared for a more advanced dynamic content. I welcomed these latest new features with the aim of optimising my results and engaging my contacts even more. It was simple and quick to set up, so here is my experience. What is dynamic content? Definition Dynamic […]

How to build and manage your sales pipeline ?

Replace an old fashion Excel spreadsheet by a sales pipeline, good or bad idea? Come on, who is still using Excel? So leave your Excel spreadsheets (it also works for Google Sheets, we saw you!) and build the new Rolls-Royce of your sales people on your brand new (and maybe even free) CRM solution.  Sales […]

New rules on cookie management, major change for software and web apps editors

New rules on cookie management, major change for software and web apps editors The tracking protection feature, first launched as a simple protection for private browsing, has recently been modified by Firefox.  In fact, in the recent version 70, this protection is now reinforced in order to increase control by the Internet user by blocking by default […]

Pipedrive and Webmecanik Automation Synchronization

A CRM solution can be an essential tool to make your sales strategy succeed. An easy-to-use tool, with many features that allow you to organise your sales pipeline as you wish. With Pipedrive, you tailor your CRM to your operation by only paying for the features you use. By combining it with Webmecanik Automation, your […]

Privacy shield: your company in danger?

The last few weeks have been filled with news about data protection. Between the invalidation of the Privacy Shield, the controversy over the use of data by Tiktok, questions about the security of personal data arise and we are here to enlighten them for you. What is Privacy Shield? The Privacy Shield is a mechanism […]

Webmecanik Pipeline news

The synchronization of your Microsoft calendar is now available with your Webmecanik Pipeline CRM. Discover the possibilities of Webmecanik syncs with your favorite calendar tools and don’t miss any of your appointments ?. New feature Synchronize your Microsoft calendar with Webmecanik Pipeline Simplify your daily organization by centralizing your Webmecanik Pipeline activities to your calendar! […]

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.