Skip to content


Phone with verification code and laptop with password screen indicating a successful 2FA login attempt

Two Factor Authentication is a simple and effective way to amplify security for your organization. Today, more and more companies are adopting the security method as a reliable layer of protection.

What is 2 Factor Authentication (2FA)?

2FA requires users to verify identities through two layers. These layers consist of 2 of the following:

  • Something you know – such as a password
  • Something you are – such as a fingerprint or Face ID
  • Something you have – such as a smart phone or other verification token

Most often users enter their usernames and passwords, and then the second level of verification is a code sent to their smartphone. The user must then verify their identity by entering the code into the 2FA system. Many systems will allow a device to be marked as ‘trusted’ so 2FA is not required with every login. For optimal security, however, it is recommended to enable 2FA upon each login.

How effective is 2FA?

According the 2020 Verizon Data Breach1 report, over 80% of hacking breaches were related to credential compromise. Unfortunately, people are still the weakest link when it comes to securing your data and systems. According to a 2019 report from Microsoft2, 2FA was 99.9% effective in blocking automated attacks. Many experts also believe 2FA will help combat password fatigue as users won’t be required to change passwords as often.

Not every 2FA solution is identical. It’s important to select the best product for your company. For more information about setting up 2FA for your organization, contact Horizon IT at 814-535-7810.




Back To Top