Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Logical Security

How Universal Two-Factor Authentication Could Change Password Security

By Silvio Kutic
January 27, 2015

As much of our day-to-day lives migrate into the digital realm, the need to secure our personal data, both online and on mobile devices, has become blindingly obvious. High-profile data breaches in 2014 have shown there is growing public demand for Internet giants, retailers and other online service providers to offer an increased level of protection for their users’ accounts. A simple way of achieving this is by introducing two-factor authentication, which in light of recent hacking attempts has grown in popularity.

Enhanced account security couldn’t come at a better time. Recent research shows that 60 percent of people use the same username and password combination for all their online accounts, from social networking to online banking. Therefore, if hackers can get their hands on a set of login details for one website, it is likely those same details will work in a number of other places. However, given the wealth of Internet-based services we now rely upon, and the sheer number of accounts we hold (according to Experian, 26 different online accounts per person on average), it’s hardly a surprise that the same password is being used time and time again.

Fortunately, less importance is being placed on our account passwords now that two-factor authentication (2FA) has become increasingly popular. 2FA bolsters security by adding another layer to the username and password mix. One of the most common forms of 2FA involves delivering a one-time PIN to a user’s mobile device, which must then be entered before they can access their account. Not only does this prove the user has the correct login credentials, it also demonstrates they have a device associated with their account in their possession. The two elements combined dramatically improve account security and make it much harder for hackers to gain access.

There is no doubt that 2FA is a consumer-friendly answer to online security challenges, but incorrectly implementing 2FA or providing consumers with an overly complicated authentication process will not have the desired effect. Users want added security, but not at the expense of convenience. Any security method, no matter how reliable, will not be adopted en masse if it negatively impacts on the user experience. This is why it’s so important to choose the right approach to 2FA.

Until recently, the use of a hardware dongle to deliver a one-time PIN was standard. This approach does work but has a number of drawbacks, not least that it presents the user with another gadget to carry around at all times which, if lost or broken, would prevent them from gaining access to their accounts.

Equally, if the 2FA process becomes too complicated, users are likely to abandon the service. Convenience is a commodity that the average consumer is unwilling to compromise over, and hardware-based dongles could easily fall into this category. The hardware-based approach isn’t suitable for multinational companies like Facebook, Google or Apple either. Their global scale and vast user base demands a universal solution that can be quickly deployed. For companies of this size, it’s essential to implement 2FA in a way that is commonplace around the world, such as SMS-based 2FA.

SMS ticks all the right boxes when it comes to added account security. Implementing 2FA in this way can turn any mobile phone, anywhere in the world, into an extra layer of account security. It also a widely used technology, and consumers are already comfortable using it. Not only that, but SMS is reliable as a communications channel and is cost-effective for large enterprises.

SMS-based two-factor authentication has already been implemented by the likes of Google, Facebook and Apple. It’s also used by a number of mobile apps (like WhatsApp) to confirm the user’s identity at installation. However, SMS-based 2FA is not limited to household names. There are a number of companies now supplying SMS-based platforms that allow all businesses to introduce 2FA. This means that, regardless of the scale of a company, it is feasible to implement the level of security needed to ensure the trust of the consumer. 

After choosing the right 2FA approach, it's important to consider how it's going to be delivered. One requirement is reliable global coverage, which is indispensable in an age where the Internet has erased borders. Many SMS providers have close partnerships with mobile carriers, but few can offer truly international connectivity that is becoming the necessity for global brands. Additionally SMS-based 2FA is not a one-size-fits-all. Companies must make sure the service they choose meets the needs of the business – there are a range of options available from one-time password or PIN generation to turnkey solutions complete with OTP functions. A business must select the right form of 2FA, from the right provider to avoid the pitfall of reduced user experience.

Ultimately, for improved account security (SMS-based 2FA or otherwise) to be effective security measures above and beyond the username and password need to be adopted by all companies and not just a select few. If a user’s details stray from the hands of Facebook and are used to hack the user’s Amazon account, it is little consolation to know one offered 2FA if the other didn’t. In a world where online security is more and more frequently being called into question, universal deployment of 2FA could be the answer, and SMS an ideal way to deliver it. 

KEYWORDS: login security password security secure authentication SMS authentication two-factor authentication

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Silvio Kutic, CEO at Infobip

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • blockchain

    How two-factor authentication works with blockchain

    See More
  • password

    What is Two-Factor Authentication? The Tip of the Security Spear

    See More
  • two factor authentication will be replaced

    Two factor authentication: Two steps forward, one step back

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing