Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Logical Security

How Universal Two-Factor Authentication Could Change Password Security

By Silvio Kutic
January 27, 2015

As much of our day-to-day lives migrate into the digital realm, the need to secure our personal data, both online and on mobile devices, has become blindingly obvious. High-profile data breaches in 2014 have shown there is growing public demand for Internet giants, retailers and other online service providers to offer an increased level of protection for their users’ accounts. A simple way of achieving this is by introducing two-factor authentication, which in light of recent hacking attempts has grown in popularity.

Enhanced account security couldn’t come at a better time. Recent research shows that 60 percent of people use the same username and password combination for all their online accounts, from social networking to online banking. Therefore, if hackers can get their hands on a set of login details for one website, it is likely those same details will work in a number of other places. However, given the wealth of Internet-based services we now rely upon, and the sheer number of accounts we hold (according to Experian, 26 different online accounts per person on average), it’s hardly a surprise that the same password is being used time and time again.

Fortunately, less importance is being placed on our account passwords now that two-factor authentication (2FA) has become increasingly popular. 2FA bolsters security by adding another layer to the username and password mix. One of the most common forms of 2FA involves delivering a one-time PIN to a user’s mobile device, which must then be entered before they can access their account. Not only does this prove the user has the correct login credentials, it also demonstrates they have a device associated with their account in their possession. The two elements combined dramatically improve account security and make it much harder for hackers to gain access.

There is no doubt that 2FA is a consumer-friendly answer to online security challenges, but incorrectly implementing 2FA or providing consumers with an overly complicated authentication process will not have the desired effect. Users want added security, but not at the expense of convenience. Any security method, no matter how reliable, will not be adopted en masse if it negatively impacts on the user experience. This is why it’s so important to choose the right approach to 2FA.

Until recently, the use of a hardware dongle to deliver a one-time PIN was standard. This approach does work but has a number of drawbacks, not least that it presents the user with another gadget to carry around at all times which, if lost or broken, would prevent them from gaining access to their accounts.

Equally, if the 2FA process becomes too complicated, users are likely to abandon the service. Convenience is a commodity that the average consumer is unwilling to compromise over, and hardware-based dongles could easily fall into this category. The hardware-based approach isn’t suitable for multinational companies like Facebook, Google or Apple either. Their global scale and vast user base demands a universal solution that can be quickly deployed. For companies of this size, it’s essential to implement 2FA in a way that is commonplace around the world, such as SMS-based 2FA.

SMS ticks all the right boxes when it comes to added account security. Implementing 2FA in this way can turn any mobile phone, anywhere in the world, into an extra layer of account security. It also a widely used technology, and consumers are already comfortable using it. Not only that, but SMS is reliable as a communications channel and is cost-effective for large enterprises.

SMS-based two-factor authentication has already been implemented by the likes of Google, Facebook and Apple. It’s also used by a number of mobile apps (like WhatsApp) to confirm the user’s identity at installation. However, SMS-based 2FA is not limited to household names. There are a number of companies now supplying SMS-based platforms that allow all businesses to introduce 2FA. This means that, regardless of the scale of a company, it is feasible to implement the level of security needed to ensure the trust of the consumer. 

After choosing the right 2FA approach, it's important to consider how it's going to be delivered. One requirement is reliable global coverage, which is indispensable in an age where the Internet has erased borders. Many SMS providers have close partnerships with mobile carriers, but few can offer truly international connectivity that is becoming the necessity for global brands. Additionally SMS-based 2FA is not a one-size-fits-all. Companies must make sure the service they choose meets the needs of the business – there are a range of options available from one-time password or PIN generation to turnkey solutions complete with OTP functions. A business must select the right form of 2FA, from the right provider to avoid the pitfall of reduced user experience.

Ultimately, for improved account security (SMS-based 2FA or otherwise) to be effective security measures above and beyond the username and password need to be adopted by all companies and not just a select few. If a user’s details stray from the hands of Facebook and are used to hack the user’s Amazon account, it is little consolation to know one offered 2FA if the other didn’t. In a world where online security is more and more frequently being called into question, universal deployment of 2FA could be the answer, and SMS an ideal way to deliver it. 

KEYWORDS: login security password security secure authentication SMS authentication two-factor authentication

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Silvio Kutic, CEO at Infobip

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • blockchain

    How two-factor authentication works with blockchain

    See More
  • two factor authentication will be replaced

    Two factor authentication: Two steps forward, one step back

    See More
  • password

    What is Two-Factor Authentication? The Tip of the Security Spear

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing