← Back to Glossary
Security Glossary

Multi-Factor Authentication (MFA)

Authentication

Multi-Factor Authentication requires users to prove their identity using two or more independent verification methods before granting access. The factors fall into three categories: something you know (a password or PIN), something you have (a phone, hardware security key, or authenticator app), and something you are (a fingerprint or face scan). When you log into an application and it sends a six-digit code to your phone or asks you to tap a hardware key after entering your password, that is MFA in action. Modern implementations typically use time-based one-time passwords (TOTP) generated by apps like Google Authenticator or Authy, push notifications through services like Duo, or hardware keys using the FIDO2/WebAuthn standard. The core idea is simple: even if an attacker steals your password, they still cannot access your account without the second factor.

Why It Matters

Passwords alone are fundamentally broken as a security mechanism. Billions of credentials have been leaked in data breaches and are freely available on the dark web. People reuse passwords across services, choose predictable ones, and fall for phishing attacks. Microsoft reports that MFA blocks over 99.9% of automated account compromise attacks. For any web application that stores sensitive data, processes transactions, or manages business operations, MFA is the single most effective security measure you can implement. It transforms account security from "one password away from a breach" to "the attacker needs to physically possess something belonging to the user", a dramatically higher bar that stops the vast majority of attacks dead in their tracks.

What Happens Without It

In 2020, Twitter suffered a high-profile breach where attackers used social engineering to gain access to internal admin tools, then took over verified accounts belonging to Barack Obama, Elon Musk, Bill Gates, and Apple to post cryptocurrency scam messages. The internal accounts that were compromised did not have MFA enforced. The attack generated over $100,000 in fraudulent Bitcoin transactions within minutes. In a more widespread example, the 2021 Colonial Pipeline ransomware attack, which disrupted fuel supply to the entire US East Coast, was traced back to a single compromised VPN credential that did not have MFA enabled. The attackers used a leaked password to log in, and without a second factor requirement, walked right through the front door.

Every app I build includes multi-factor authentication by default.

(737) 637-1651