Diving into Two-Factor Authentication (2FA)

What’s Two Factor Authentication (2FA)?

Two-factor authentication, commonly known as 2FA, is a security protocol where users validate their identity using two distinct verification methods. This dual-layer protection prevents unauthorized access, even if someone has the password.

2FA in Action

In essence, 2FA requires both a password and a secondary verification method, which could be a code sent to a mobile device or a biometric input like a fingerprint. This secondary method is unique to the user, making unauthorized access considerably more challenging.

The Significance of 2FA

Given that passwords can be vulnerable, either through being too simple or being reused across platforms, 2FA offers an extra shield of protection. By demanding a second unique verification, it drastically reduces the chances of unauthorized breaches.

Varieties of 2FA

Several 2FA methods exist, each with its pros and cons:

  • SMS or Voice Calls: A prevalent method where codes are sent via text or voice call. It’s user-friendly but can be compromised if the phone number falls into the wrong hands.
  • Authenticator Apps: These apps generate verification codes and are typically more secure than SMS methods. However, they rely on the user’s device being available and functional.
  • Hardware Tokens: Physical devices that produce verification codes. They’re highly secure but might be less convenient due to the need for the physical device.

Activating 2FA

Setting up 2FA is usually straightforward:

  1. Navigate to the security settings of the platform you wish to secure.
  2. Locate the 2FA or equivalent option.
  3. Follow the provided steps to activate 2FA.

Why Embrace 2FA?

2FA is a crucial tool in today’s digital age, especially for accounts holding sensitive data like bank or email accounts. If you haven’t activated 2FA on your accounts, it’s a wise move to consider. Here are some additional 2FA best practices:

  • Opt for a robust password for any 2FA tool.
  • Safeguard your 2FA tools and never share them.
  • Activate 2FA on all vital accounts.
  • Regularly update your 2FA preferences.

By adhering to these guidelines, you bolster the defenses of your online accounts against potential threats.

About Dr. Tom

Thomas Hyslip currently serves as an Assistant Professor of Instruction in the Department of Criminology, University of South Florida teaching exclusively in the online Master of Science in Cybercrime program. The program is a unique blend of criminology, digital forensics, cybercrime investigations, and incident response course work.

Prior to USF, Dr. Hyslip worked as a Special Agent with the Defense Criminal Investigative Service (DCIS) and United States Secret Service for 23 years.  While assigned to the DCIS Southeast Field Office, Dr. Hyslip led an undercover operation dedicated to targeting and dismantling the most egregious cyber-criminal enterprises. Dr. Hyslip worked with the National Security Agency, and the United States Cyber Command to identify and infiltrate cyber-criminal organizations targeting the DoD.

In 2012, Dr. Hyslip was promoted to lead the newly created Department of Defense, Defense Criminal Investigative Service (DCIS), Cyber Resident Agency. He led daily procedural and operational activities of special agents in eight locations across the eastern United States responding to computer intrusions within the DoD and the Defense Industrial Base.  His office also provided computer forensic support to all DCIS offices and investigations within the Eastern United States, Europe, Africa and Southwest Asia.  During this time, Dr. Hyslip worked proactively to target international Cyber-Crime groups and worked undercover to penetrate underground cyber-crime organizations which resulted in the dismantlement of the WebStresser DDoS platform in 2018; the ExoStresser DDoS platform in 2019; and the PowerStresser DDoS platform in 2020. 

Dr. Hyslip is also a retired U.S. Army Colonel. His last assignment was as a Historian with the U.S. Army Center of Military History. He was previously assigned to the Office of the Surgeon General as an Environmental Engineer, and as an Assistant Professor of Preventive Medicine at the F. Edward Hébert School of Medicine, Uniformed Services University of the Health Sciences. COL Hyslip has a mix of active duty and reserve assignments spanning over 27 years including assignments with the US African Command, Office of Inspector General, the Department of Defense, Office of Inspector General, and the US Army Reserve Information Operations Command. In 2005, COL Hyslip deployed to Iraq with the 306th Military Police Battalion and earned a Bronze Star, Purple Heart, and Combat Action Badge.

Dr. Hyslip earned his Doctor of Science degree in Information Assurance from Capitol College, Master of Science degree in Technology Systems from East Carolina University, and his Bachelor of Science degree in Mechanical Engineering from Clarkson University.  Tom and his wife Susan live in Tega Cay, SC with their daughter Reagan. 

 

 

 

Sign up here to receive the Tega Cay Sun "day" Spectator every Sunday morning with all the news from the week directly to your inbox

×