Back to blog
4 min read

MFA: The Security Control You're Probably Not Using Enough

Why passwords alone fail, which MFA methods actually work, and how to implement authentication that doesn't annoy users.

SecurityMFA

Password-only authentication is broken. Credential stuffing, phishing, and database breaches make single-factor authentication inadequate for anything important.

Multi-factor authentication fixes this. Even with stolen credentials, attackers can't get in without the second factor.

Yet I still see production systems protected by passwords alone. Critical infrastructure. Customer data. Admin accounts.

Don't Leave Your Accounts Vulnerable Why Multi-Fac

What MFA Actually Means

MFA requires verification from multiple categories:

  • Something you have: Phone, hardware key, authenticator app
  • Something you know: Password, PIN
  • Something you are: Fingerprint, face, retina

Two passwords isn't MFA. A password plus a code from your phone is.

Which Method to Use

Authenticator apps (TOTP): Google Authenticator, Authy, Microsoft Authenticator. These generate time-based codes that change every 30 seconds. Better than SMS because they resist SIM-swapping attacks.

Hardware keys (FIDO2/WebAuthn): YubiKey, Google Titan. Best protection against phishing because they're cryptographically bound to legitimate domains. A fake login page can't get your key to authenticate.

SMS codes: Better than nothing, but vulnerable to SIM swapping. Attackers call your carrier, pretend to be you, and transfer your number to their SIM. Then they receive your codes.

My recommendation: Authenticator apps for most accounts. Hardware keys for anything critical - admin access, financial accounts, email (since email resets everything else).

Setting Up MFA

Enable it everywhere that matters:

Critical (do first):

  • Email (controls password resets for everything else)
  • Banking and financial accounts
  • Cloud provider consoles (AWS, GCP, Azure)
  • Password manager

Important:

  • Social media (especially if used for work)
  • Any account with saved payment methods
  • Work applications

Most platforms: Settings โ†’ Security โ†’ Two-factor authentication

Backup and Recovery

What happens when you lose your phone?

Recovery codes: Most services provide backup codes when you enable MFA. Store these securely - password manager, encrypted file, or printed in a safe.

Backup authenticator: Authy syncs across devices. If you lose one phone, you still have access from another.

Secondary methods: Register a backup phone number or email for recovery. Just understand this creates another attack vector.

Test your recovery: Before you need it, verify you can actually recover access. I've seen people locked out of critical accounts because they never tested their backup codes.

Common Mistakes

Only protecting some accounts. Attackers find the weakest link. If your email doesn't have MFA, they reset passwords on everything else.

Using SMS when better options exist. If the service supports authenticator apps or hardware keys, use those.

Not storing recovery codes. You will eventually lose access to your MFA device. Have a backup plan.

Sharing MFA devices. Each person should have their own authentication method. Shared MFA defeats the purpose.

Key Takeaways

  • Passwords alone are insufficient - enable MFA on all important accounts
  • Authenticator apps beat SMS for most use cases
  • Hardware keys provide the strongest protection against phishing
  • Email is your most critical account - secure it first
  • Store recovery codes before you need them
  • Test your recovery process while you still have access
BT

Written by Bar Tsveker

Senior CloudOps Engineer specializing in AWS, Terraform, and infrastructure automation.

Thanks for reading! Have questions or feedback?