Two-Factor Authentication (2FA) is an extra layer of security used to protect online accounts by requiring two forms of verification before granting access. Instead of just entering a password, users must also provide a second factor, making it much harder for hackers to gain access.

Typically, we say that for two-factor authentication, you need to have 2 of the 3 of the following groups of authentication:

1. Something you know

This is typically a password or phrase

2. Something you have

This is something physical, like a physical security token

3. Something you are

This is typically biometric in nature. Fingerprint, face, and even retina scans.

Using a combination of these groups, systems can help secure resources against bad actors. In addition to the user providing any of the three factors above, the authentication system usually looks at other derived information such as:

Geographical location – Are you trying to login from somewhere that’s familiar to you, or are you away from home (higher risk)

Type of equipment you are logging in from – Are you using a device that’s familiar to the authentication system? Is it a random public device or unknown device (higher risk)


How 2FA Works

When logging into an account with 2FA enabled, you’ll need to:

  1. Enter your password (something you know).
  2. Verify your identity using a second factor, such as:
    • A one-time code sent to your phone via SMS.
    • A code from an authentication app (Google Authenticator, Authy, etc.).
    • A biometric scan (fingerprint or facial recognition).
    • A hardware security key (YubiKey, Titan Security Key).

Types of 2FA Methods

  1. SMS or Email Codes – A temporary code sent to your phone or email.
  2. Authenticator Apps – Apps like Google Authenticator, Authy, or Microsoft Authenticator generate time-sensitive codes.
  3. Biometric Authentication – Using Face ID, Touch ID, or fingerprint scanning.
  4. Hardware Security Keys – USB or NFC keys like YubiKey provide physical authentication.
  5. Backup Codes – A set of pre-generated codes you can use when other methods are unavailable.

Why Use 2FA?

  • Enhances Security – Even if your password is stolen, hackers can’t access your account without the second factor.
  • Prevents Unauthorized Access – Helps protect against phishing, data breaches, and password leaks.
  • Required by Many Services – Google, Apple, Microsoft, and banks recommend or require 2FA.

How to Enable 2FA

  1. Go to your account security settings (Google, Facebook, etc.).
  2. Look for “Two-Factor Authentication” or “2-Step Verification.”
  3. Choose a verification method (SMS, Authenticator app, security key, etc.).
  4. Follow the setup instructions and save backup codes.

Final Thoughts

2FA is one of the best ways to keep your online accounts secure. For even stronger protection, use an authenticator app or a hardware key instead of SMS codes, as phone numbers can be hacked via SIM swapping.

Using Google Password Manager

Google Password Manager securely stores and auto-fills your passwords across your devices using your Google account.

How to Set Up 2FA on Your Google Workspace Account (User Guide)

If your company or organization uses Google Workspace, you can protect your account with 2-Step Verification (2FA). Here’s how to enable it:

What’s With The Windows 10 Email From Microsoft?

A few months ago, Microsoft announced the EOL (End-of-Life) date for Windows 10. At the time of this writing, that date is set for October 14, 2025. After the EOL date, Windows 10 will no longer receive updates of any kind from Microsoft.

Using Firefox Password Manager

Firefox has a built-in password manager called Firefox Lockwise (now part of Firefox Sync) that securely stores and auto-fills your passwords across devices.

It’s 2024. Do I still need a printer?

Thinking about getting a printer? Did you also realize that it's 2024 and that printing is so last century? Like, who really needs to print anyway? Are you printing a manifesto? Do you live in a shack in the woods? But seriously... This article attempts to do two...

Using Apple Keychain (now Passwords)

Apple Keychain, also known as iCloud Keychain, securely stores and manages your passwords, credit card details, and Wi-Fi credentials across Apple devices.

Should I use a Password Manager?

With our lives being as busy as they already are, having to remember logins for each site we use can be an added headache nobody wants. The alternative is using a single or set of passwords across every site, but that can't be safe right? The truth is, that if the...

How Domain Name Registrations Work

Domain names are registered through a domain name ‘registrar.’ Think of them as a ‘county clerks’ office who is responsible for maintaining a record repository of ownership. However, in this case, you can have multiple registrars doing domain name registrations, but all of them have to follow the same rules and cannot allow for duplicate domain name registrations.