• Thursday, Nov 26, 2020
  • Last Update : 06:52 pm

OP-ED: Staying safe online

  • Published at 11:58 pm October 26th, 2020
digital security privacy
Photo: BIGSTOCK

Why multi-factor authentication (MFA) has become a necessity today

In the competitive global market, continuous advancement of smart devices and related activities has increased. Hence, people are giving up and sharing a lot of their personal and professional security details.

The traditional authentication systems work as a sender identifies himself/herself through a password-generated system, and the system thus validates his/her identity whilst making sure s/he is the legitimate owner of the system.

However, this traditional process is no longer appreciated because of the ongoing cyber-security risks, and that a single password can no longer be used as the only validation the user can depend on from an information technology perspective.

Primarily, single-factor authentication (SFA) was mostly adopted due to its simplicity and user-friendliness, where the user can simply log in to his/her accounts by providing a password (PIN) against his/her user ID. Though it was simple in managing, this was considered to be one of the weakest levels of authentication.

To increase the security base, later two-factor authentication (2FA) was adopted as a rescuer to deal with the risks that SFA could not provide. With 2FA, after receiving a username and password, the site then sends the user a unique one-time passcode (OTP) via text messaging or automatically calling and verbally delivering the 2FA code to the user.

Later, multi-factor authentication (MFA) was introduced as a higher and advanced level of security measure. MFA is a trusted security method that requires verification from non-related credentials to authenticate user identity for login or transaction purposes.

MFA incorporates several independent credentials: Password, security token, and biometric verification. Before logging in, the users are required to access MFA codes (one-time passwords (OTP)) sent via email or text and then a biometric verification such as a face ID or fingerprint scan. MFA is used to create a layered defense for disabling a cyber perpetrator to access a software target such as its computing device, database, and network.

Why MFA is needed in today’s competitive world

  • Identifies who’s who: It helps to ensure that everyone who accesses the device/product is really who they claim they are, helping to reduce the risk of account and product compromise.
  • Security through multiple authentication: If a cyber threat actor attempts to authenticate an account with MFA enabled, the targeted user will receive a second authentication factor. This user should immediately recognize the compromise and take corrective measures to address such an attempt.
  • Firewalls the firewalls: Anti-virus and advanced firewalls are only as strong as their user authentication procedures. MFA security measures bolster this existing security perimeter. MFA considerably beefs up the credential strength. It also makes stolen passwords less fruitful for hackers. In the era of cyber theft, MFA prevents password theft and hacking attempts such as phishing, keylogging, and pharming.
  • Added layer of security: It provides an added layer of security for biometric login and authentication which is light years more secure than other authentication factors. It provides increased data security and protection to important transactions and portal logins and prevents unauthorized access to sensitive data. In other words, MFA makes identity theft harder for perpetrators.
  • Prevents ‘foothold’ compromise: Without MFA’s extra layer of protection, a cyber thief can compromise a poorly-protected software application and exploit the associated email account to gain access to additional user information.

MFA prevents the “foothold” compromise that provides the superusers with access and privileges to the entire system environment. If implemented correctly, it can prevent most threat actors from easily gaining an initial foothold into software products, even if credentials and license keys are compromised.

  • Protect high-profile accounts: MFA can be used for protecting executive accounts of high-ranking employees, organizations, software, and privileged user accounts which are frequent targets for hackers.
  • Prevent malicious cyber activities: With MFA, an organization can prevent attackers from stealing and destroying data, changing software programs, and using the targeted accounts to transmit propaganda, spam, or malicious code.
  • Effective for small businesses: MFA measures are not only effective for enterprise-class software and organizations but also for small businesses and SMEs which are more prone to cyber-attacks. MFA provides simple, relatively easy, and cost-efficient measures for these small organizations.


MFA is now being ubiquitously used in banking, gaming, social media, and related transactions and communications. While many users are concerned about their biometrics, if the biometrics are properly implemented, it will not only save personal and professional privacy but also will make sure that this crucial information does not end up in the wrong hands.

Sumaiya Noor is a development sector research professional. Her areas of interests include RMG Automation, Energy & Environment, Green Finance, and Sustainable Development. She can be reached at [email protected]

314
305
blogger sharing button blogger
buffer sharing button buffer
diaspora sharing button diaspora
digg sharing button digg
douban sharing button douban
email sharing button email
evernote sharing button evernote
flipboard sharing button flipboard
pocket sharing button getpocket
github sharing button github
gmail sharing button gmail
googlebookmarks sharing button googlebookmarks
hackernews sharing button hackernews
instapaper sharing button instapaper
line sharing button line
linkedin sharing button linkedin
livejournal sharing button livejournal
mailru sharing button mailru
medium sharing button medium
meneame sharing button meneame
messenger sharing button messenger
odnoklassniki sharing button odnoklassniki
pinterest sharing button pinterest
print sharing button print
qzone sharing button qzone
reddit sharing button reddit
refind sharing button refind
renren sharing button renren
skype sharing button skype
snapchat sharing button snapchat
surfingbird sharing button surfingbird
telegram sharing button telegram
tumblr sharing button tumblr
twitter sharing button twitter
vk sharing button vk
wechat sharing button wechat
weibo sharing button weibo
whatsapp sharing button whatsapp
wordpress sharing button wordpress
xing sharing button xing
yahoomail sharing button yahoomail