Multi-Factor Authentication: How Does It Work?

Multi-factor Authentication (MFA) is a security solution that requires users to verify their identity using more than one form of authentication in order to access accounts. It provides greater assurance that people are who they say they are by forcing them to authenticate their identity in more than one manner, lowering the risk of unwanted access to sensitive data. After all, entering a stolen password to get access is one thing; entering a stolen password and then being prompted to enter a One-Time Password (OTP) sent to the actual user’s smartphone is another.

MFA’s purpose is to provide a layered defense that makes it much harder for an unidentified user to get access to a target, such as a physical place, computing device, network, or database. If one of the factors is hacked or broken, the attacker still has one or more barriers to overcome before successfully breaking into the target. 

Why is MFA Important?

The fundamental advantage of Multi-factor Authentication is that it increases the security of your company by requiring your users to identify themselves with more than just a login and password. While usernames and passwords are extremely important, they are prone to brute force attacks and can be obtained by third parties. Enforcing the use of an MFA feature, such as a thumbprint or physical hardware key, increases your organization’s assurance in its ability to protect itself from cyber attackers.

How Does Multi-Factor Authentication Work?

When an end-user signs in to an account, they will enter their username and password as usual. They will then be prompted to authenticate their identification, usually with a couple of options. 

The majority of MFA authentication methods rely on one of three sorts of extra information:

  • Things you know (knowledge) – Typically, a personal security question must be answered by the user. Passwords, four-digit personal identification numbers (PINs), and one-time passwords are examples of knowledge factor technologies (OTPs). The following are examples of typical user scenarios:
    • at the grocery store, swiping a debit card and entering a PIN;
    • downloading a virtual private network client with a valid digital certificate and logging into the VPN before receiving network access; and
    • giving information to acquire system access, such as the mother’s maiden name or former residence.
  • Things you have (possession) – To log in, users must have something specific in their possession, such as a badge, token, key fob, or phone subscriber identity module (SIM) card. In the case of mobile authentication, the possession factor is frequently provided by a smartphone in connection with an OTP app. The following are examples of common possession factor user scenarios:
    • mobile authentication, in which users receive a code via their smartphone to gain or allow access – versions include out-of-band text messages and phone calls sent to a user, smartphone OTP apps, SIM cards, and smart cards with stored authentication data; and
    • adding a USB hardware token that generates an OTP to a desktop and using it to log in to a VPN client.
  • Things you are (inherence) – These are any biological features that the user possesses that are confirmed for login. The following biometric verification methods are based on inherence factor technologies:
    • fingerprint scan
    • voice authentication
    • facial recognition
    • retina or iris scan
    • hand geometry
    • digital signature scanners
    • earlobe geometry

The following are examples of typical inherence factor scenarios:

  • gaining access to a smartphone using fingerprint or facial recognition;
  • presenting a digital signature at a retail checkout; and
  • using earlobe geometry to identify a criminal.

As we rely more and more on cloud services and accounts for day-to-day company operations, it is essential to ensure that these accounts are secure against malicious threat actors. Multi-factor authentication is a simple and effective technique to safeguard our accounts in the workplace and in everyday life. Expert IT Solutions strongly recommends all enterprises to use multi-factor authentication whenever possible to ensure optimal account protection.

Tax Phishing Scam

Tax Phishing Scam

Cybercriminals are targeting taxpayers in the US state of California by sending text messages that look like they’re from the Franchise Tax Board (FTB), a state tax agency. The message claims that...

read more
IT Department Scam / Help Desk Scam

IT Department Scam / Help Desk Scam

This Isn’t the Help Desk You're Looking For. Let's say you receive an unexpected call on Microsoft Teams, an app for voice calls, sending messages, and video chats. The call is from a user named “IT...

read more
Email Survey Scam

Email Survey Scam

you get an email that looks like it’s from a trusted brand, such as Costco or AAA. The email promises a free gift if you fill out a short survey and pay a small shipping fee so that the gift can be...

read more