top of page
Articles Library

Understanding Multi-Factor Authentication


by Amiram Pinto The password: it is arguably the most popular and most common security measure available, and at a lot of times it is also the most vulnerable. It seems like every other news cycle contains a story about a data breach and millions of compromised passwords. And what is the response of most organizations in the event or threat of a data breach? It is to change user passwords.

But the password has a lot of shortcomings. For starters, passwords do not provide a strong enough verification of identity. Anyone who gets a hold of the password can simply unlock an account and do as they wish once access is granted. In addition, the security of the account is based solely on the strength of the password, which, as we all know, is usually not strong enough. Nobody remembers a string of characters containing uppercase, lowercase, numeric, and special characters. Users want something simple and easy to remember. The dark flipside to that coin, however, is that it unwittingly makes the account very easy to hack.

This is the reason why organizations are adopting multi-factor authentication (MFA) to supplement the password as a means of access control, or in some cases, as an actual alternative to passwords.

What is Multi-Factor Authentication? Multi-factor authentication (MFA) is a security enhancement that verifies a user’s identity by requiring two or more pieces of evidence when logging into or accessing an account. So, end users must present at least two forms of identity verification before logging in.

The goal of MFA is to create a layered defense and make it more difficult for an unauthorized person to access a target such as a physical location, computing device, network, or database. If one factor is compromised or hacked, the attacker still has at least one more barrier to breach before successfully gaining access to the target. In the past, MFA systems typically relied upon two-factor authentication. Increasingly, vendors are using the label "multi-factor" to describe any authentication scheme that requires more than one identity credential.

What factors are actually involved in a multi-factor authentication process?

To be granted access to an account protected by multi-factor authentication, users must combine verification factors from at least three different groups instead of just a single password. These groups are:

1. Something You Know This is usually a password, PIN, passphrase, or questions and their corresponding answers. In order to successfully authenticate using this factor, the user must enter information that the system can then match against what was previously setup or stored.

2. Something You Have Before smartphones became commonplace in the business landscape, users would carry around tokens or smartcards. These devices would generate a one-time use code that could then be typed or entered into the system. Today, most businesses use smartphones as the device that generates these codes or allows them to respond back to a server with a one-time use code behind the scenes.

3. Something You Are These are biometric traits, and include anything from fingerprints, retina scans, facial recognition, voice biometrics, or a user’s behavior (such as how hard or fast they type, move a mouse, or swipe on a screen) that can be used to identify a unique user.

With multi-factor authentication, security is strengthened because users are required to enter not only a password, but also another authentication factor—something that would be much harder for hackers to steal.

A Vital Element of Cyber Security Increasingly, many organizations are recognizing the threat of data breaches. The frequency and scope of these breaches continues to rise, which is one of the reasons why cyber security has become a top priority for many organizations, especially with the rise of cloud communications.


To address this concern head-on, the majority of organizations have turned to and are implementing MFA. In fact, the multi-factor authentication market is expected to reach $12.5 billion by 2022. This shows that a lot of organizations think that MFA is, right now, one of the best security measures that can be implemented to protect your company, users, and sensitive data.

Multi-factor authentication provides a layer of protection for both employees and customers against hackers, scammers, and thieves. It mitigates the ripple effect of compromised credentials: a hacker may steal a username and password, but if they’re prompted for another factor before they can access critical data, make a transaction, or log into a system, they’re stopped cold.

Implementing MFA So, it’s all about adding factors. But how an MFA solution is implemented is just as important as the credentials it’s asking to validate. A good multi-factor authentication method combines two or more factors in a convenient way. The usability of the implementation must always be the first consideration when installing a multi-factor authentication system.

Why? Because nobody can be expected to remember a 16-digit password with special characters, answer a question about their third-grade teacher’s favorite pet, then input a one-time-password generated by an app, and finally type in arbitrary text while wiggling the mouse to determine their behavior pattern. A good multi-factor method should be just as simple and convenient to use as the original computer-based authentication method: the password.

Even when applying multi-factor authentication, organizations can still stay focused on customer experience. The good news is that multi-factor authentication can be seamless. It’s just a matter of choosing the right authentication methods.

Seamless Authentication Across Channels NICE Real-Time Authentication (RTA) provides end-to-end authentication and fraud prevention for contact centers. Based on voice biometrics, it automatically verifies the caller’s claimed identity within the first few seconds of a call through natural conversation with an agent.

Leveraging its unique Single Voiceprint capability, RTA uses the same voiceprint across channels, allowing effortless authentication in the Interactive Voice Response (IVR) or mobile application as well. Combining voice biometrics with additional authentication factors, RTA offers risk-based authentication across multiple channels.

It improves the level of security, reduces operational costs, and the best thing is… consumers don’t even notice it!


Amiram Pinto Amiram Pinto is the Product Marketing Manager of NICE Real-Time Authentication. With 15 years of experience in Telecommunications and Contact Centers, Amiram is a true expert in speech recognition and enthusiastic about security and authentication. While at NICE Amiram was a senior product manager, involved in the design of new modules and features for various products including RTA and NICE Engage, the leading contact center recording platform.

115 Comments


iWin dạo này thấy bạn bè nhắc hoài nên mình cũng tò mò ghé thử xem sao. Vào cái là thấy giao diện khá thoáng, nền sáng nhìn dễ chịu chứ không bị nhồi chữ hay màu mè quá đà. Mình chỉ lướt nhanh thôi, nhưng cách họ trình bày nội dung kiểu chia từng khung rõ ràng nên mắt bắt thông tin nhanh, không phải kéo lên kéo xuống mãi mới hiểu đang ở đâu. Thanh menu cũng đặt dễ thấy, bấm qua lại mượt, không có cảm giác bị lạc giữa đống mục. Nói chung hợp kiểu người mới vào lần đầu như mình, nhìn một lúc là quen tay. Mình thích nhất là mấy tiêu đề và…

Like

rikvip hôm trước mình thấy bạn bè nhắc suốt nên tò mò bấm vào xem thử, kiểu vào lướt cho biết chứ không định làm gì nhiều. Vừa mở lên cái mình để ý ngay là giao diện nhìn sạch sẽ, không bị nhồi nhét quá nhiều thứ nên đỡ rối mắt. Mình hay khó chịu mấy trang mà chữ với banner chồng chéo, còn ở đây các phần tách ra rõ ràng nên kéo xuống vẫn theo kịp. Cái mình thích nữa là thanh menu đặt khá dễ thấy, bấm qua lại nhanh, không phải mất công tìm đường. Nói chung chỉ cần vài phút là hiểu họ sắp xếp nội dung theo từng khối và tiêu đề nổi…

Like

sunwin mình cũng mới ghé thử vì thấy mấy đứa bạn nói suốt. Không có hứng ngồi khám phá sâu, mình chỉ lướt nhanh xem giao diện với cách họ sắp xếp thông tin thôi. Cảm giác đầu tiên là nhìn khá thoáng, không bị nhồi chữ nên đọc đỡ mỏi mắt. Mình thích kiểu họ chia nội dung thành từng khối rõ ràng, kéo xuống là biết mình đang ở phần nào chứ không bị lẫn lộn. Thanh điều hướng để mấy mục chính gọn gàng, bấm qua lại cũng dễ, không phải đoán xem nó nằm ở đâu. Nói chung mới vào mà không thấy “ngợp”, chỉ cần vài giây là định vị được chỗ cần nhìn. Nhìn…

Like

GO88 hôm trước mình cũng tò mò nên ghé thử coi giao diện ra sao thôi. Không phải kiểu ngồi nghiên cứu gì đâu, mình chỉ lướt nhanh xem có dễ tìm thứ mình cần không. Vào cái là thấy trang làm khá sáng sủa, khoảng trống vừa đủ nên nhìn không bị rối mắt. Mình thích nhất là phần điều hướng để ngay chỗ dễ thấy, bấm qua lại mấy mục cũng mượt, không phải kéo lên xuống liên tục. Mấy khung nội dung chia rõ ràng nên đọc lướt vẫn nắm được họ sắp xếp thông tin kiểu gì. Nói chung cảm giác dùng ổn, không bị “ngợp” khi mới mở lên. Nhìn kỹ thì chữ với các…

Like

789WIN dạo này mình thấy xuất hiện khá nhiều trong mấy hội nhóm nói về giải trí online nên cũng ghé vào xem thử. Mình không thử từng mục game, chủ yếu nhìn cách trang chia menu và sắp xếp các phần như thể thao, casino, slot, game bài… Điểm mình để ý là bố cục khá tách bạch, mỗi khu có kiểu hiển thị riêng nên nhìn lướt cũng dễ hiểu. Thanh điều hướng và các bảng thông tin đặt khá trực quan, không phải mò quá lâu để tìm đúng mục mình muốn xem. Với mình vậy là ổn cho lần đầu vào.

Like

If you enjoyed this article, receive free email updates!

Thanks for subscribing!

Join 45,000 subscribers who receive our newsletter with
resources, events and articles

Thanks for subscribing!

 

Barb Ferrigno, Concept Marketing Group

We are passionate about our marketing. We've seen it all in our 48 years - companies come and go but the businesses that are consistent, steady, and have a goal are the companies that succeed. We work with you to keep you on track, change with new technologies and business strategies, and, most importantly, help you to succeed. It's not always easy, and it's a lot of hard work but the rewards are well worth the effort. 

2025 Concept Marketing Group                                 cmg.barbferrigno@gmail.com                                         www.MarketingSource.com

 


                                                  

bottom of page