\n In this webinar recording, learn tips & tricks for maximizing IT security while minimizing user pushback with DoorDash's System Administrator <\/p>\n <\/div>\n
\n
Watch Now<\/a>\n <\/div>\n<\/div>\n\n\n\n\nThree Most Common Types Of MFA Factors<\/h2>\n\n\n\n
The most commonly used MFA factors fall into one of three categories:<\/p>\n\n\n\n
\n- Knowledge<\/strong>, aka something you know<\/em>, such as a password or security question<\/li>\n\n\n\n
- Possession<\/strong>, aka something you have<\/em>, such as an SMS code or physical key<\/li>\n\n\n\n
- Inherence<\/strong>, aka something you are<\/em>, such as a fingerprint or face ID<\/li>\n<\/ol>\n\n\n\n
Some would argue that there are a total of five categories of authentication factors, including Location<\/strong>, aka somewhere you are<\/em>, and Behavior<\/strong>, aka something you do<\/em>. Since these are less common forms of authentication\u2014and often less secure\u2014this article will focus on the three primary categories of MFA factors.<\/p>\n\n\n\nKnowledge Factors Are The Least Secure Authentication Factors<\/h2>\n\n\n\n
Password fatigue<\/a> is real. In today\u2019s tech-driven society, every single one of us manages multiple devices and accounts. This means multiple passwords, PINs, and answers to security questions, which are all examples of knowledge factors. What\u2019s the easiest way to keep them all straight? Use the same ones across work and personal accounts. <\/p>\n\n\n\nThe innate weakness of knowledge factors can be illustrated by this telling statistic: 91% of people<\/a> understand the risk of reusing passwords, yet 61% still do it<\/a>. The fear of forgetting \u201csomething you know\u201d drives behavior more heavily than the fear of a hypothetical security breach. This is why IT admins need to step in with additional authentication factors.<\/p>\n\n\n\nExamples Of Possession Factors<\/h2>\n\n\n\nEmail & SMS Verification Codes<\/h3>\n\n\n\n
Verification codes sent via text or email are arguably the most widespread form of authentication. Unfortunately, they are also the least secure of the possession factors because they can be intercepted by malicious players. Targeted attacks on mobile networks<\/a> or email inboxes are easier to execute than we\u2019d like to think.<\/p>\n\n\n\nTime-based, One-Time Passwords (TOTPs)<\/h3>\n\n\n\n
TOTPs<\/a> are similar in concept to email and SMS verification codes, but they are more secure in practice. This is for two reasons: <\/p>\n\n\n\n\n- the code is produced directly on a device in the user\u2019s possession, and; <\/li>\n\n\n\n
- the code adheres to a strict time limit before expiring <\/li>\n<\/ol>\n\n\n\n
With no third-party network involved and a very narrow time window, there is much less opportunity for a potential breach.<\/p>\n\n\n\n
Push Notifications<\/h3>\n\n\n\n
Push notification factors<\/a> are a more sophisticated version of TOTPs and can be easily implemented with mobile apps like JumpCloud Protect<\/a>. Instead of inputting a time-sensitive code, the user just needs to accept the authentication request produced directly on their smartphone. <\/p>\n\n\n\nThis factor is literally as easy as pressing a button and provides a better user experience than TOTPs. Additionally, push notification MFA incorporates another factor of security in a seamless way by requiring a user to authenticate to their phone with a PIN, fingerprint, or face ID.<\/p>\n\n\n\n
Hardware Keys<\/h3>\n\n\n\n
Hardware MFA devices<\/a> are a highly secure possession factor because they require the use of a physical piece of hardware. Hardware keys only pose a risk to security if they are lost or stolen from the user. Also known as universal second factor (U2F) keys, users can either plug the key directly into their login device for authentication, or use the key to generate a unique code for a variation of a TOTP.<\/p>\n\n\n\nExamples Of Inherence Factors<\/h2>\n\n\n\nPhysical Biometrics<\/h3>\n\n\n\n
Unlike behavioral biometrics, physical biometrics are unable to be changed by the user and independent of any device. Physical biometric factors include:<\/p>\n\n\n\n