SlideShare a Scribd company logo
TWO-FACTOR
AUTHENTICATION
What on
earth is 2FA?
How to protect your users
from bad guys.
2FA is a method of
using information
from 2 different
sources to confirm
an identity
Two locks are
much harder to
break than one.
is two-factor
authentication / 2FA?
A 2FA system asks for:
WHAT?
does my website or app need 2FA?
WHY?
+
New vulnerabilities
discovered in 2012,
415 of them on mobile
operating systems.***
Sources:* APWG Phishing Trends Report / **internetretailer.com / ***Symantec Corporation. Internet Security Threat Report 2013 :: Volume 18
5 291
The number of
phishing sites spoofing
social networking sites
increased 125%.***
125%
Financial and payment
services remain the
most targeted industry
sectors.*
FACT.
Online fraud cost
e-retailers $3.5 billion
in 2012.**
$3.5B
In Q4 of 2013,
30% of personal
computers worldwide
were infected with
malware.*
30%
I hack
for a living
Just look
at the facts
SMS
&
Something
you know:
Password
Something
you have:
One-time
PIN
YOU SHOULD USE 2FA TO AUTHENTICATE...
Users when accessing
their accounts from an
unknown device
The creation of
user accounts
Sales leads by
requesting a genuine
phone number
User access to
accounts or
secure servers
Users don’t need a
smartphone or internet
access
Immediate delivery of
authentication codes
96% of the population
have mobile subscriptions
Online networks
during the signup
process
should I protect my users
with 2FA?
WHEN?
BENEFITS OF USING SMS FOR 2FA...
Who would
you trust?
Remember
hackers and phishers?
If you touch my users,
you touch me...
2
FACTOR
FACTOR
1
www.clickatell.com

More Related Content

PPTX
Cybercrime
PDF
Digital Gen: Security Infographic
PDF
Distil Networks Protecting the Telephony Industry
PPTX
PDF
RSA Monthly Online Fraud Report - June 2013
 
PPTX
Vodqa why cybersecurity
PDF
Symantec Website Security Threat Report 2014 - RapidSSLOnline
PDF
Alternative Finance & Payments stream - Stuart Sykes slides
Cybercrime
Digital Gen: Security Infographic
Distil Networks Protecting the Telephony Industry
RSA Monthly Online Fraud Report - June 2013
 
Vodqa why cybersecurity
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Alternative Finance & Payments stream - Stuart Sykes slides

What's hot (20)

PPT
eCrime Conference March 2006
PPTX
Social Media & Cybersecurity
PDF
Mobile E-commerce: Friend or Foe
 
PPTX
What Makes Web Applications Desirable For Hackers
PDF
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
PDF
The Current State of Cybercrime 2014
 
PDF
India Threat Lanscape as per Symantec Research
PDF
A Joint Study by National University of Singapore and IDC
PPT
Driving Payment Innovation - Know Your Enemy
PDF
Critical Update Needed: Cybersecurity Expertise in the Boardroom
PDF
Why Your Finance Firm Must Monitor For Stolen Accounts
PDF
The Current State of Cybercrime 2013
 
PDF
Symantec's Internet Security Threat Report for the Government Sector
PDF
Criminal Alert Notice (myPay)
PDF
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
PPTX
Internet threats and its effect on E-commerce
PDF
Symantec Intelligence Report: May 2015
PDF
Is your data safe Infographic by Symantec
PDF
2019 Identity Protection and Data Breaches Survey
 
PDF
Taking Control of the Digital and Mobile User Authentication Challenge
 
eCrime Conference March 2006
Social Media & Cybersecurity
Mobile E-commerce: Friend or Foe
 
What Makes Web Applications Desirable For Hackers
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
The Current State of Cybercrime 2014
 
India Threat Lanscape as per Symantec Research
A Joint Study by National University of Singapore and IDC
Driving Payment Innovation - Know Your Enemy
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Why Your Finance Firm Must Monitor For Stolen Accounts
The Current State of Cybercrime 2013
 
Symantec's Internet Security Threat Report for the Government Sector
Criminal Alert Notice (myPay)
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
Internet threats and its effect on E-commerce
Symantec Intelligence Report: May 2015
Is your data safe Infographic by Symantec
2019 Identity Protection and Data Breaches Survey
 
Taking Control of the Digital and Mobile User Authentication Challenge
 
Ad

Similar to User authentication-info-graphic (20)

PPTX
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
PDF
Mobile malware and enterprise security v 1.2_0
PDF
Fraudsters Hackers & Thieves
PDF
Fraudsters Hackers & Thieves!
PDF
Online financial fraud infographic
PPT
cyber terrorism
PPT
cyber terrorism
PPTX
What Cybercriminals Want: Company Data – by United Security Providers
PDF
Year of the AppSec Breach_Forrester
PDF
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
PDF
2021 Cybersecurity Recap: How Did We Fare Last Year?
PDF
Advanced Cybersecurity Solutions | Zero Dark 24
PDF
Cyber Security Report 2019
PDF
Adam Bulava GCC 2019
PPTX
The Five Biggest Cyber Security Trends In 2022
PDF
Cybersecurity - Webinar Session
PDF
Verizon 2014 data breach investigation report and the target breach
PDF
CBIZ Cyber Security - What Every Business Needs to Know
PDF
Why is cyber security a disruption in the digital economy
PDF
State of Cyber Crime Safety and Security in Banking
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Mobile malware and enterprise security v 1.2_0
Fraudsters Hackers & Thieves
Fraudsters Hackers & Thieves!
Online financial fraud infographic
cyber terrorism
cyber terrorism
What Cybercriminals Want: Company Data – by United Security Providers
Year of the AppSec Breach_Forrester
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2021 Cybersecurity Recap: How Did We Fare Last Year?
Advanced Cybersecurity Solutions | Zero Dark 24
Cyber Security Report 2019
Adam Bulava GCC 2019
The Five Biggest Cyber Security Trends In 2022
Cybersecurity - Webinar Session
Verizon 2014 data breach investigation report and the target breach
CBIZ Cyber Security - What Every Business Needs to Know
Why is cyber security a disruption in the digital economy
State of Cyber Crime Safety and Security in Banking
Ad

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation theory and applications.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Cloud computing and distributed systems.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation theory and applications.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
sap open course for s4hana steps from ECC to s4
Building Integrated photovoltaic BIPV_UPV.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectroscopy.pptx food analysis technology
MIND Revenue Release Quarter 2 2025 Press Release
Diabetes mellitus diagnosis method based random forest with bat algorithm
20250228 LYD VKU AI Blended-Learning.pptx
Cloud computing and distributed systems.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MYSQL Presentation for SQL database connectivity
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx

User authentication-info-graphic

  • 1. TWO-FACTOR AUTHENTICATION What on earth is 2FA? How to protect your users from bad guys. 2FA is a method of using information from 2 different sources to confirm an identity Two locks are much harder to break than one. is two-factor authentication / 2FA? A 2FA system asks for: WHAT? does my website or app need 2FA? WHY? + New vulnerabilities discovered in 2012, 415 of them on mobile operating systems.*** Sources:* APWG Phishing Trends Report / **internetretailer.com / ***Symantec Corporation. Internet Security Threat Report 2013 :: Volume 18 5 291 The number of phishing sites spoofing social networking sites increased 125%.*** 125% Financial and payment services remain the most targeted industry sectors.* FACT. Online fraud cost e-retailers $3.5 billion in 2012.** $3.5B In Q4 of 2013, 30% of personal computers worldwide were infected with malware.* 30% I hack for a living Just look at the facts SMS & Something you know: Password Something you have: One-time PIN
  • 2. YOU SHOULD USE 2FA TO AUTHENTICATE... Users when accessing their accounts from an unknown device The creation of user accounts Sales leads by requesting a genuine phone number User access to accounts or secure servers Users don’t need a smartphone or internet access Immediate delivery of authentication codes 96% of the population have mobile subscriptions Online networks during the signup process should I protect my users with 2FA? WHEN? BENEFITS OF USING SMS FOR 2FA... Who would you trust? Remember hackers and phishers? If you touch my users, you touch me... 2 FACTOR FACTOR 1 www.clickatell.com