{"id":24503,"date":"2022-10-17T09:03:45","date_gmt":"2022-10-17T01:03:45","guid":{"rendered":"https:\/\/www.exabytes.sg\/blog\/?p=24503"},"modified":"2022-10-17T09:03:45","modified_gmt":"2022-10-17T01:03:45","slug":"two-factor-authentication-2fa-data-privacy","status":"publish","type":"post","link":"https:\/\/www.exabytes.sg\/blog\/two-factor-authentication-2fa-data-privacy\/","title":{"rendered":"Why Two-Factor Authentication Is Necessary to Protect Your Data and Privacy"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24506 size-full\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/two-factor-authentication-2fa-necessary.jpg?resize=696%2C364&#038;ssl=1\" alt=\"two factor authentication 2fa \" width=\"696\" height=\"364\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/two-factor-authentication-2fa-necessary.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/two-factor-authentication-2fa-necessary.jpg?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/two-factor-authentication-2fa-necessary.jpg?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/two-factor-authentication-2fa-necessary.jpg?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/two-factor-authentication-2fa-necessary.jpg?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/two-factor-authentication-2fa-necessary.jpg?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/two-factor-authentication-2fa-necessary.jpg?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/two-factor-authentication-2fa-necessary.jpg?resize=803%2C420&amp;ssl=1 803w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">First things first: before we can even begin to discuss what exactly <a href=\"https:\/\/www.exabytes.sg\/blog\/best-practice-secure-microsoft-onedrive-files\/\">Two Factor Authentication<\/a> is, also referred to as <strong>2FA<\/strong>, how it works, and what the benefits are, we need to get a firm grasp on what Authentication is. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is usually recommended to have some type of authentication before accessing any data, whether it be an application, software, or data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Think of the variable that will be used to keep this data as your house, and consider authentication to be the key that will let you inside. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is possible for the place holder to be a database, access files, variable files, or any other kind of file that links to the data in the store or application.<\/span><\/p>\n<h3><strong>Understanding of Authentication: Google Account<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">You will have a much better understanding of Authentication after looking at the example of a Google account.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A Google account may be used for a multitude of different things, like sending and receiving emails, watching videos on YouTube, locating places on Google Maps, browsing and downloading the most recent apps from the Play Store, and a lot of other activities. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">All of these can be done using a single email account. Which indicates that having authentication in order to access one&#8217;s <strong>Google Account<\/strong> is the most important thing that may be done.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You may become aware of the destruction that can be wreaked on your personal identification while you are online if an unauthorised individual gains access to your account. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">These might also refer to the numerous applications that are associated with your Google Account.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You should have recognised, after reading the introduction to the scenario that was just presented, how critical it is to have a secure and reliable password (one that follows all the guidelines to a password that cannot be realised easily).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At this point in time, the only thing standing between you and access to your Google account is your password. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This becomes the major characteristic used for authentication. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to this, if you add in another means of authentication, it would be a randomly generated <a href=\"https:\/\/www.exabytes.sg\/online-marketing\/bulk-sms-marketing\">OTP (One-Time-Password)<\/a> that Google would send to your cell phone or other email ID. <\/span><\/p>\n<p><strong>Two-factor authentication, often known as 2FA, is being used here.\u00a0<\/strong><\/p>\n<h2><b>Why is it critical to make use of two different forms of authentication?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24507 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/2fa-login-account.jpg?resize=696%2C497&#038;ssl=1\" alt=\"2fa login account\" width=\"696\" height=\"497\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/2fa-login-account.jpg?resize=1024%2C731&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/2fa-login-account.jpg?resize=300%2C214&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/2fa-login-account.jpg?resize=768%2C548&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/2fa-login-account.jpg?resize=1536%2C1097&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/2fa-login-account.jpg?resize=696%2C497&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/2fa-login-account.jpg?resize=1068%2C763&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/2fa-login-account.jpg?resize=160%2C114&amp;ssl=1 160w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/2fa-login-account.jpg?resize=588%2C420&amp;ssl=1 588w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/2fa-login-account.jpg?resize=100%2C70&amp;ssl=1 100w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/2fa-login-account.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/2fa-login-account.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately, you can no longer rely on your password alone to keep you secure. <a href=\"https:\/\/www.exabytes.my\/blog\/cyber-attack-malaysia-cyber-security-threats\/\" rel=\"noopener\">Malware on your computer<\/a> (or even on the website itself!) can simply steal your password and use it again. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is true even if you use a unique password for each website that you use. Or, if someone watches you enter your password, they might be able to memorise it and then log in using your account.<\/span><\/p>\n<p><strong>Do you honestly believe that it won&#8217;t ever happen to you? <\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Hackers are able to easily get into a large number of internet accounts and take control of them by employing strategies such as &#8220;credential stuffing,&#8221; &#8220;password spraying,&#8221; or brute-force attacks. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">That is true each and every time. Even industry leaders like Cisco and Apple&#8217;s iCloud service are susceptible to cyberattacks. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This includes retail giants, supermarket delivery services, phone networks, and even music streaming websites and cell networks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These automated attempts to log in cannot access accounts that have been protected with a two factor authentication method.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When you utilise two-factor authentication, you are protected against phishing emails as well. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even if someone sends you an email that looks fishy and tries to trick you into giving your social media username and password to a fake site, two-factor authentication 2fa can still protect you. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is because two-factor authentication uses more than one piece of information to verify your identity. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Your two-factor authentication code will only be valid if it comes from the genuine website.<\/span><\/p>\n<h2><b>How the use of two-factor authentication helps secure your data and your privacy<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Two-factor authentication is becoming increasingly significant as businesses, governments, and the general public come to the realisation that passwords alone are not sufficient to keep user accounts secure in the technological world of today. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In fact, the annual cost of a data breach has now risen to an average of more than two trillion dollars. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even though two-factor authentication guards against a wide variety of vulnerabilities, the most typical ones are:<\/span><\/p>\n<h3><b>1. Stolen Passwords<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A password can be used by anyone who is able to obtain a copy of it. If a user were to write down their password on a piece of paper, for instance, that piece of paper may be stolen and then used to access the person&#8217;s account. <\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Two-factor authentication<\/strong>, on the other hand, requires the user to authenticate themselves using a second device in addition to entering a password.<\/span><\/p>\n<h3><b>2. Phishing Attempts\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Hackers frequently distribute emails that contain links to malicious websites with the intention of infecting a user&#8217;s computer or coercing the victim into divulging their passwords. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whoever is responsible for the hacking will be able to utilise the password once it has been discovered. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Two-factor authentication (2FA) is an additional layer of security that can be added on top of a password to prevent phishing.<\/span><\/p>\n<h3><b>3. Brute-force Attacks<\/b><\/h3>\n<p>When conducting a brute-force assault, a hacker generates passwords for a particular computer randomly until they discover the correct one.<\/p>\n<p>The second layer of security that two-factor authentication (2FA) provides is the requirement that a login attempt be validated before access may be granted.<\/p>\n<h3><b>4. Social Engineering<\/b><\/h3>\n<p>Hackers typically resort to simple deception to coerce victims into divulging their credentials.<\/p>\n<p>They can earn the user&#8217;s trust before asking for their login details if they pose as an IT employee working at the user&#8217;s organisation and appear to be working there.<\/p>\n<p><strong>Two-factor authentication<\/strong> (2FA) prevents this from occurring by verifying, after a password has been entered, the user&#8217;s location as well as their IP address.<\/p>\n<h3><b>5. Key Logging<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Even if the user has not written their password down, it is possible for hackers to steal it using software that copies the password as the user types it. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers will watch what you input and will save the password so that they can use it in the future. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second step of verification that is provided by two-factor authentication (2FA) makes it possible for a user to confirm that they are the one attempting to log in, even if their password has been compromised.<\/span><\/p>\n<h2><b>Comparison of Two-Factor Authentication to Multi Factor Authentication<\/b><\/h2>\n<p><span style=\"font-weight: 400;\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24509 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/multi-factor-authentication-2fa.jpg?resize=696%2C464&#038;ssl=1\" alt=\"multi factor authentication\" width=\"696\" height=\"464\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/multi-factor-authentication-2fa-scaled.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/multi-factor-authentication-2fa-scaled.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/multi-factor-authentication-2fa-scaled.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/multi-factor-authentication-2fa-scaled.jpg?resize=1536%2C1024&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/multi-factor-authentication-2fa-scaled.jpg?resize=2048%2C1365&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/multi-factor-authentication-2fa-scaled.jpg?resize=696%2C464&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/multi-factor-authentication-2fa-scaled.jpg?resize=1068%2C712&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/multi-factor-authentication-2fa-scaled.jpg?resize=171%2C114&amp;ssl=1 171w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/multi-factor-authentication-2fa-scaled.jpg?resize=630%2C420&amp;ssl=1 630w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/multi-factor-authentication-2fa-scaled.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are a variety of Authentication systems available, one of which is known as Two-Factor Authentication.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MFA, which stands for &#8220;<a href=\"https:\/\/www.exabytes.my\/blog\/best-practices-against-common-cyber-attacks\/\" rel=\"noopener\"><strong>Multi Factor Authentication<\/strong><\/a>,&#8221; is a type of authentication that necessitates the provision of two or more verification factors on the part of the user before gaining access to any application, data bit, or data stream. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having numerous authentication factors will make it less likely that a cyber attack will be launched via that particular channel.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The following three categories of data provide the basis for the vast majority of the Multi-Factor Authentication methods:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Your knowledge \u2013 Like the password or PIN<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Your inheritance \u2013 Biometric, Voice recognition, Optical recognition<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Your possession \u2013 Smartphone, Swipe cards<\/span><\/li>\n<\/ul>\n<h3><b>How can we tell them apart from one another?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">All in all, &#8220;Two Factor Authentication&#8221; (also known as &#8220;2FA&#8221;) is a subset of &#8220;Multi Factor Authentication&#8221; (also known as &#8220;<a href=\"https:\/\/www.exabytes.my\/blog\/best-practices-against-common-cyber-attacks\/\" rel=\"noopener\">MFA<\/a>&#8220;). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">MFA is a type of authentication that can employ more than two different procedures to verify the identity of a user or access.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let&#8217;s take a look at a different scenario: this time, you&#8217;re in an Apple store to make a purchase of a MacBook, an iPhone, or an iPad. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">You&#8217;ll need to supply two pieces of information in order to sign in to a new device for the first time: your password, as well as a <strong>six-digit verification code<\/strong> that is either displayed on your trusted devices or texted to the phone number associated with your account.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Due to the rise in the frequency of <a href=\"https:\/\/www.exabytes.my\/blog\/most-vulnerable-industries-to-cyberattacks\/\" rel=\"noopener\">cyberattacks<\/a> and the exposure of private information, simply knowing your password is no longer sufficient to gain access to your account. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Two-factor authentication, also known as 2FA, is a significant improvement to the level of protection afforded to both your Apple ID and the private data you keep within the Apple Cloud.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Consider the possibility that you have misplaced your iPhone, iPad, or MacBook. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this scenario, there is a considerable risk that sensitive information could be stolen if the device falls into the wrong hands.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is possible to use the mobile device in one of two ways as an authenticator:<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"> Having an authenticator programmed already installed on your device, which will create random numbers to fulfil the requirements of the first phase of the authentication process.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Enter the <strong>TAC code<\/strong> that comes with the mobile device.<\/span><\/li>\n<\/ol>\n<h3><b>Just what is the TAC?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24510 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/tac-type-authentication-code.jpg?resize=696%2C417&#038;ssl=1\" alt=\"tac type authentication code\" width=\"696\" height=\"417\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/tac-type-authentication-code.jpg?resize=1024%2C614&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/tac-type-authentication-code.jpg?resize=300%2C180&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/tac-type-authentication-code.jpg?resize=768%2C461&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/tac-type-authentication-code.jpg?resize=1536%2C922&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/tac-type-authentication-code.jpg?resize=696%2C418&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/tac-type-authentication-code.jpg?resize=1068%2C641&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/tac-type-authentication-code.jpg?resize=190%2C114&amp;ssl=1 190w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/tac-type-authentication-code.jpg?resize=700%2C420&amp;ssl=1 700w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/tac-type-authentication-code.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/tac-type-authentication-code.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <a href=\"https:\/\/support.exabytes.sg\/en\/support\/solutions\/articles\/14000113766--my-domain-registry-mynic-two-factor-authentication-configuration\" rel=\"noopener\">Type Authentication Code<\/a>, also known as TAC, is a code consisting of eight digits that is used to specifically identify the hardware of a cellular device. <\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.gsma.com\/\" rel=\"noopener\">GSMA<\/a> creates it, and it is composed of the first eight digits of the IMEI number of the device.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now, once we combine our standard password authentication process with the TAC, the data access will be in a category all its own. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">After reviewing all of these specifics, we must understand that utilising two <\/span><span style=\"font-weight: 400;\">factor authentication, also known as 2FA, is the most effective way for defending ourself from automated log-in attempts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The following are some examples of two-factor authentication mechanisms, listed from least popular to most popular:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Text message code<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An Authenticator App \u2013 Like Google authenticator<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Biometrics<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Physical security key \u2013 RSA token authenticators that generate random combinations of pass keys<\/span><\/li>\n<\/ul>\n<h2><b>Conclusion: Implementation of Two Factor Authentication by Exabytes\u00a0\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Starting October 1st, 2022, Exabytes had fully implemented <strong>Two Factor Authentication (2FA)<\/strong> Time Based Tokens on its cPanel and billing system logins in order to increase data security, safeguard customers&#8217; privacy, and protect their sensitive data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Customers of Exabytes are needed to enter a six-digit number in addition to their regular login and password when using Time-based Tokens. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is in addition to the ordinary login and password. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Only your token device, which is typically a mobile app installed on your smartphone, will be able to generate one-time passwords and have access to the secret key associated with your account.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To learn how to enable two-factor authentication (2FA), <\/span><span style=\"font-weight: 400;\">click here<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><a href=\"https:\/\/support.exabytes.sg\/en\/support\/solutions\/articles\/14000138837-how-to-set-up-two-factor-authentication-in-billing-system\" rel=\"noopener\">How to Set Up Two-factor Authentication in Billing System<\/a><\/p>\n<p><a href=\"https:\/\/support.exabytes.sg\/en\/support\/solutions\/articles\/14000127953-set-up-2fa-two-factor-authentication-for-plesk-portal\" rel=\"noopener\">Set up 2FA ( Two Factor Authentication ) for Plesk portal<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>First things first: before we can even begin to discuss what exactly Two Factor Authentication is, also referred to as 2FA, how it works, and what the benefits are, we need to get a firm grasp on what Authentication is. It is usually recommended to have some type of authentication before accessing any data, whether [&hellip;]<\/p>\n","protected":false},"author":75,"featured_media":24506,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7],"tags":[540,196,472],"class_list":{"0":"post-24503","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-sharing-tips-for-success","8":"tag-cybersecurity","9":"tag-security","10":"tag-website-security"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/two-factor-authentication-2fa-necessary.jpg?fit=1200%2C628&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pbHhPQ-6nd","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/users\/75"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/comments?post=24503"}],"version-history":[{"count":4,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24503\/revisions"}],"predecessor-version":[{"id":24512,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24503\/revisions\/24512"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media\/24506"}],"wp:attachment":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media?parent=24503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/categories?post=24503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/tags?post=24503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}