autenticazione a due fattori

Also known as 2FA (two-factor authentication), the use of so-called strong authentication increases the security level of every account. Two-factor authentication is undoubtedly the most secure method to protect your account.

Why is it important to use it?

Even if you use complex and different passwords for each account, you cannot be certain that someone won’t gain access to your login credentials without your knowledge. In contrast, with two-factor authentication, if someone attempts to breach your account, they must face a dual identification request. Two-factor authentication allows you to both block unauthorized access and be immediately alerted .

Two-factor authentication: How does it work?

2FA is very simple and involves two steps:

  1. The system requests the first factor, which is your username and password.
  2. The system requests the input of a numeric code (second factor) that is generated automatically.

Obtaining the numeric code (OTP) can be done through the following methods:

Free Apps

Also called Soft Tokens, these apps generate temporary codes (every 30 seconds).

Among the most commonly used are Google Authenticator, Authy, and Microsoft Authenticator . To set it up, simply download the app on your smartphone, scan the QR code on your computer screen with the camera, and the app will provide a 6-digit numeric code to enter for login.

SMS

You receive the numeric code directly via SMS.

Email

You receive the numeric code in your email.

Additionally, if you receive an unrequested authentication code, you can immediately realize that someone is attempting to breach your account at that precise moment by trying to execute an unauthorized login.

Final considerations

The effectiveness of this authentication method is also demonstrated by the fact that, in order to further secure online banking operations, the European regulation on digital payments, which came into effect on December 31, 2020, mandates Strong Customer Authentication with dual user identification verification.

Beyond the contexts regulated by law, it is important to emphasize that the use of two-factor authentication should be a preferred
choice, especially for all business or personal accounts where sensitive and important data are stored. Therefore, aside from the obligation in specific areas, our suggestion is always to opt for this system, which is simple and at the same time significantly secure.

Share This