ClickCease
Call Now Get Quote
(201) 669-3107

Two-Factor Authentication: Your Best Defense Against Account Takeover

By Bergen Computer Solutions

Passwords alone are no longer enough. Two-factor authentication (2FA), also called multi-factor authentication (MFA), is the single most effective way to prevent account takeover. Here's everything you need to know.

What Is Two-Factor Authentication?

2FA requires two different types of verification to access an account:

  • Something you know — Password or PIN
  • Something you have — Phone, security key, or token
  • Something you are — Fingerprint or face recognition

Even if an attacker steals your password, they can't access your account without the second factor.

Why 2FA Is Essential

The statistics are compelling:

  • Microsoft reports MFA blocks 99.9% of account compromise attacks
  • 80% of data breaches involve compromised credentials
  • Stolen passwords are readily available on the dark web
  • Phishing attacks are increasingly sophisticated

Types of Two-Factor Authentication

Authenticator Apps (Recommended)

Apps like Microsoft Authenticator, Google Authenticator, or Authy generate time-based codes:

  • More secure than SMS
  • Works without cell service
  • Free to use
  • Can support push notifications for easier login

SMS Text Messages

One-time codes sent via text:

  • Easy to set up and use
  • Better than no 2FA
  • Vulnerable to SIM swapping attacks
  • Requires cell service

Hardware Security Keys

Physical devices like YubiKey:

  • Highest security level
  • Phishing-resistant
  • Works even if phone is compromised
  • Requires purchasing hardware ($25-50 per key)
  • Recommended for administrators and high-value accounts

Biometrics

Fingerprint or facial recognition:

  • Convenient—nothing to remember or carry
  • Often combined with other factors
  • Hardware dependent

Where to Enable 2FA

Prioritize these accounts:

  1. Email — Gateway to all other accounts via password resets
  2. Financial accounts — Banking, payroll, payment processors
  3. Cloud services — Microsoft 365, Google Workspace, AWS
  4. Social media — Especially if used for business
  5. Password managers — Protects all your other passwords
  6. Any account with sensitive data

Implementing 2FA in Your Business

Step 1: Inventory Accounts

List all business applications and services that support 2FA.

Step 2: Choose Methods

Decide which 2FA method for each account type:

  • Authenticator apps for most accounts
  • Hardware keys for administrators and sensitive systems
  • SMS only where better options aren't available

Step 3: Roll Out Gradually

Start with IT and executives, then expand to all employees. Provide training and support.

Step 4: Enforce with Policy

Make 2FA mandatory through technical controls, not just policy. Most platforms allow requiring 2FA.

Backup and Recovery

Plan for lost phones and devices:

  • Save backup codes in a secure location
  • Register multiple devices where possible
  • Have a process for employees who lose their 2FA device
  • Consider hardware keys as backup for critical accounts

Need Help With Your IT?

Bergen Computer Solutions provides expert IT support for businesses and home users throughout Bergen County.

Contact Us Today (201) 669-3107