!!! Overview[1] [{$pagename}] or [MFA] is an approach to [Authentication] which requires the [assertion] of [two|2FA] or more of __independent__ [Authentication Factors] and it considered a to have a higher [Level Of Assurance] (or [Vectors of Trust]) than [Authentication Methods] than using only one [Authentication Factor] [{$pagename}] is where more than one [Authentication Factors] and each factor [SHOULD] be independent. After [assertion] of one or more of these [Authentication Factors] must be evaluated by the other party for [Authentication] to occur. For [{$pagename}], it must be two or more. [{$pagename}] is used without regards to the method of obtaining the [Authentication Factors] !! Why you need [{$pagename}] ! [Google] Our research shows that simply adding a recovery phone number to your Google Account can block up to 100% of automated bots, 99% of bulk phishing attacks, and 66% of targeted [attacks] that occurred during our investigation. ! [NIST] [{$pagename}] helps protect you by adding an additional layer of [security], making it harder for [bad guys|Attackers] to log in as if they were you. Your information is safer because thieves would need to steal both your [password] and your phone. You would definitely notice if your phone went missing, so you’d report it before a thief could use it to log in. Plus, your phone should be locked, requiring a PIN or fingerprint to unlock, rendering it even less useful if someone wants to use your [MFA] credentials. Using [2FA] is one of the top three things that security experts do to protect their security online, according to recent [Google] survey. And consumers feel the same way: almost 9 in 10 (86%) say that using [2FA] makes them feel like their online information is more secure, according to TeleSign. ! [Microsoft] * 279% more enterprise security incidents from [2016|Year 2016] to [2017|year 2017] * 81% of [Attacks] [breaches|Breach] leveraged either weak or stolen [passwords] [Microsoft] says MFA decreases your risk of user compromise by 99% !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [Multi-Factor Authentication|https://en.wikipedia.org/wiki/Multi-factor_authentication|target='_blank'] - based on information obtained 2014-10-26 https://en.wikipedia.org/wiki/Multi-factor_authentication * [#2] - [How to upgrade your security with Azure Multi-Factor Authentication|https://www.youtube.com/watch?v=FxW8vLxAjSk|target='_blank'] - based on information obtained 2019-12-15 * [#3] - [TELESIGN CONSUMER ACCOUNT SECURITY REPORT|https://www.telesign.com/resource/research-and-reports/telesign-consumer-account-security-report/|target='_blank'] - based on information obtained 2019-12-15 * [#4] - [THE WHY, WHEN AND HOW OF CUSTOMER MULTI-FACTOR AUTHENTICATION|https://www.pingidentity.com/en/company/blog/posts/2018/the-why-when-and-how-of-customer-multi-factor-authentication.html|target='_blank'] - based on information obtained 2019-12-15 * [#5] - [Enforce uniform MFA to company-owned resources|https://cloud.google.com/identity/solutions/enforce-mfa|target='_blank'] - based on information obtained 2019-12-15 * [#2] - [How effective is basic account hygiene at preventing hijacking|https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html|target='_blank'] - based on information obtained 2019-12-15