A MNIT security expert answers common questions about MFA
3/19/2025 12:45:08 PM
By Blake Russell, Information Security Analyst, MNIT
Multi-factor authentication (MFA), also known as two-step verification or two-factor authentication, provides extra security for each of your online accounts and apps. It’s a simple way to protect valuable information.
For example, when you withdraw money from an ATM, you use MFA as you:
Together, these two factors prove it's you and stop criminals who only have your card.
MFA is a way to protect your accounts from unauthorized access. It requires at least two different steps to confirm your identity. This reduces the likelihood that an unauthorized user (like a cyber criminal) can access your personal data, such as health records, credit card numbers, and financial information.
Technology helps us connect to others, access information faster, and take care of business online. But cyber criminals leverage that same innovation to create increasingly sophisticated ways of stealing information.
Passwords are especially vulnerable. Criminals can use password-guessing software or social engineering attacks to trick users into revealing their credentials through email or phone scams.
According to an Aldridge report, the number of cybercrime complaints rose by over 300% in 2021. The majority of the rise was due to phishing scams and extortion – primarily through ransomware.
MFA keeps your accounts and sensitive data protected – even if a criminal obtains your password – because access still requires a second or third form of authentication.
MFA works on the principle that you must present two or more types of authentication methods to verify your identity before you can access your online accounts, applications, or virtual private networks (VPN). For these methods to provide the best protection, each must fall into a separate category of authentication.
These different authentication categories of MFA include:
This may be a password, passphrase, answer to a security question, or personal identification number (PIN).
This may be a hardware token (key fob), mobile token (authenticator app), or a code sent by text or email.
These are biometric factors such as fingerprints and facial recognition.
Although not as common, access can be limited to certain geographic areas.
Consider these examples:
The biggest benefit of MFA is the added layer of protection against unauthorized access. Each authentication category can compensate for the limitations of the others. The significant increase in remote work has placed more companies and employees in the crosshairs of cyber criminals, but MFA is a relatively simple addition that can dramatically reduce the number of successful attacks.
MFA is not without its drawbacks. Sometimes people don’t like having physical tokens that can be forgotten, lost, or stolen. But the potential downsides of MFA are greatly outweighed by the benefits it provides. As more organizations work to strike balance between employee productivity and security—especially in hybrid workplace environments—expect to see greater acceptance and more routine integration of MFA solutions going forward.
Cybersecurity
Cybersecurity
Cybersecurity Month