Blog
2FA, double factors authentication: protect yourself and your data
3 min read

2FA, double factors authentication: protect yourself and your data

As you may have already noticed, multiple factors authentication is now widely used to log in to your favorite personal and professional applications. Even though you find it annoying, it protects you and your data that so we should learn to understand and love it ?.

In this article, we will review in a simple way the characteristics of this process and why it is so important today.

2FA, Double Factors Authentication, what is it?

2 factors authentication (2FA) is a system which proves that you are the person that you pretend to be by testing yourself with two different factors. It’s as if you had two different types of access to your home: a digital door code and a key lock for example. 

This system works by using two different categories of factors which aim to prove that you are you. There are several factors that you may encounter, here are the most used:

  • Knowledge factors: password, PIN code…
  • Biometric factors: fingerprints, facial or voice recognition
  • Possession factors: key, smartphone, mobile app, email…

Possession factors examples (Mr. Robot-like gadgets): a key with number rotation or a biometric key.

Other types of factors may also be used in some cases:

  • Location factors: access to an application is only allowed in certain geographical areas.
  • Time factors: systems may restrict the use of the application only to a specific time window.

Why is 2FA important?

Today, the security of your data is a major issue. Consequences of identity theft on your applications can quickly ruin your life and even cost you a lot.

Two factors authentication systems can block a large part of cyber attacks that you may suffer.

100% brute force attacks blocked (nothing to do with a call to The Rock to access your applications ?). These are programs that can find your password based on a dictionary which lists the common passwords. The system will try them one by one until it finds the right one. It is one of the most common cyber attacks.

76% to 100% phishing and social engineering attacks blocked. You are probably starting to get used to receiving fake but very well made emails asking for your personal data, this is phishing. Social engineering is based on the analysis of your social media to find personal information which could be your password (the name of your cat for instance ?).

The main method to bypass the double factors authentication is heavy and complex: SIM swapping. Someone makes your phone operator believe your smartphone is lost (smartphones are mostly used by 2FA) and intercepts your new SIM card before you receive it. He then changes all your passwords within a few hours and takes control of your applications. 

 

Why do we talk about 2FA?

Webmecanik cares about its client’s growing need for data security. That’s why we offer you the opportunity to set up Double Factors Authentication for your Webmecanik applications: Webmecanik Automation and Webmecanik Pipeline.

Now you understand the importance of protecting you virtually, we hope you’ll use this option available to all our users.

Do you want to know more about the 2FA set up? Read our support article on Two Factors Authentication.

Continuer d’explorer les articles

Automation Update – August 2017

Automation Update – August 2017 We have the pleasure of informing you that the new version of your Webmecanik Automation software will soon be released! You will find new CRM integrations, performance improvements for importing files, UTM tracking for email links, as well as new campaign conditions. List of New Features UTM Tracking It is […]

Side-by-side comparison: Webmecanik Automation versus Mailchimp

Marketers from all over the world use Mailchimp for their email marketing needs. Mailchimp is, indeed, the leader in this field and has very attracting prices. It is true that the tool works well when you’re starting out, but if you need something a bit more robust and want to take a step further and […]

Discover 5 essential statistics to analyze your business data

Discover 5 essential statistics to analyze your business data Discover the new essential statistics to analyze your sales data in your CRM. Your statistics are enhanced with 5 new charts available. ? The power of statistics for a successful commercial strategy Analyzing your business data is essential to guide your actions and manage your business […]

Webmecanik Pipeline: the new european CRM, free and easy to use to convert your contact into customer

Salesforce, SugarCRM, Pipedrive… Today, to manage customer relationship projects efficiently, European companies need to integrate CRM and marketing automation softwares.  However, normally the existing offers have two major inconvenients:  The market is dominated by big american companies, which can cause problems on the data protection and GDPR respect ; Software multiplication is costly, takes time […]

Inbound marketing represents the revival of B2B marketing

Le Vertone’s Green Paper on inbound marketing has just been published. I was happy to participate in an interview with some of the market’s most important editors such as Oracle, Hubspot, and Marketo, as well as our friends from Zuma, 1min30, Aressy, Pim-Bim, Les Navigateurs ou Plezi. A summary of the state of B2B inbound […]

Webmecanik Pipeline update – June 2023

The renovations to the Webmecanik Pipeline calendar are complete ? Discover the new, more ergonomic interface and the new features that will make your business life easier ? Improvements The Calendar View Gets a Makeover ✨ The view of your activities in Webmecanik Pipeline calendar has been revamped for improved ergonomics and ease of use.. […]

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.