<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &#8211; AbsTechServices.co.uk</title>
	<atom:link href="https://web.abstechservices.co.uk/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://web.abstechservices.co.uk</link>
	<description>IT Support</description>
	<lastBuildDate>Fri, 05 Sep 2025 13:16:02 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://web.abstechservices.co.uk/wp-content/uploads/2025/02/cropped-AbsTechIconLarge-32x32.png</url>
	<title>Security &#8211; AbsTechServices.co.uk</title>
	<link>https://web.abstechservices.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Reduce your Network Exposure to the Internet</title>
		<link>https://web.abstechservices.co.uk/2025/09/05/how-to-reduce-your-network-exposure-to-the-internet/</link>
					<comments>https://web.abstechservices.co.uk/2025/09/05/how-to-reduce-your-network-exposure-to-the-internet/#respond</comments>
		
		<dc:creator><![CDATA[AbsTechAdmin]]></dc:creator>
		<pubDate>Fri, 05 Sep 2025 13:14:29 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Guide]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Network]]></category>
		<guid isPermaLink="false">https://web.abstechservices.co.uk/?p=477</guid>

					<description><![CDATA[1. Twingate In testing a lot of the solutions today for remote access, I have settled on Twingate for secure remote access for home lab. It is really easy to setup and they have a free account which is great for home labs. With the free account, it is free for 5 users, you get [&#8230;]]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p><strong>1. Twingate</strong></p>



<p>In testing a lot of the solutions today for remote access, I have settled on Twingate for secure remote access for home lab. It is really easy to setup and they have a free account which is great for home labs. With the free account, it is free for 5 users, you get the enterprise connectors, split tunneling, and conditional access policies.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="576" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/bc1c7cbc-428f-4487-9c3b-68a971a5f0ea-1024x576.webp" alt="" class="wp-image-482" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/bc1c7cbc-428f-4487-9c3b-68a971a5f0ea-1024x576.webp 1024w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/bc1c7cbc-428f-4487-9c3b-68a971a5f0ea-300x169.webp 300w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/bc1c7cbc-428f-4487-9c3b-68a971a5f0ea-768x432.webp 768w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/bc1c7cbc-428f-4487-9c3b-68a971a5f0ea-1536x864.webp 1536w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/bc1c7cbc-428f-4487-9c3b-68a971a5f0ea.webp 1920w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Some may not like the fact that it is a paid solution with a proprietary cloud dashboard, but so far, this has not been a show stopper for me. The cloud dashboard actually makes it easier to manage from wherever you are and since it is free as part of the solution, this is an added bonus in my opinion.</p>



<p>Also, since you can spin up the connectors that you run on-premises using Docker, Raspberry Pi or many other options that are available. I have these spread out through my network on different devices, including:</p>



<ul class="wp-block-list">
<li>Running a connector on my Synology NAS.</li>



<li>Running a connector on one of my Docker hosts.</li>



<li>I have one also running in a dedicated virtual machine.</li>



<li>A Raspberry Pi which I can plug into any network with an internet connection.</li>
</ul>



<p><strong>What is Twingate?</strong></p>



<p>Twingate is more of a hybrid of VPN and proxy technology. Compared to traditional VPN solutions, it has a much more modern approach to segmentation, access control, and other features like zero-trust.</p>



<p><strong>Reasons I use it:</strong></p>



<ul class="wp-block-list">
<li><strong>No open ports</strong> on my firewall – How? Well, the traffic is established <strong>from</strong> the connector so as long as it can egress, it can establish the tunnel</li>



<li>Granular access control per user and device</li>



<li>Easy to deploy on Docker, VMs, or Raspberry Pi</li>



<li>Works great with dynamic IPs or CGNAT</li>



<li>Built-in DNS resolution for internal services you may be hosting</li>
</ul>



<p>Even when I am traveling, I can hit any internal service in my home lab. This includes Proxmox dashboard, pfSense, Netdata, Gitea, Portainer, etc, just like I was local on the LAN.</p>



<p>Twingate also lets me separate services. I can restrict certain resources to certain devices or accounts. This is perfect if I want to allow read-only access to others (or segment off something sensitive).</p>



<p><strong>2. Tailscale mesh VPN built on Wireguard</strong></p>



<p>One of the other very popular choices in this space is Tailscale. It is a mesh VPN that is built on Wireguard. Home labbers love the solution because it is dead simple. You install the agent on your devices, sign into it, and when you do, everything is connected with each other. Each device that is on the Tailscale network gets a private IP address in the 100.x.x.x range. Using this IP address, between devices, you can talk to other devices directly.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="682" height="383" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image.png" alt="" class="wp-image-478" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image.png 682w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-300x168.png 300w" sizes="(max-width: 682px) 100vw, 682px" /></figure>



<p><strong>What makes Tailscale awesome to use:</strong></p>



<ul class="wp-block-list">
<li>No port forwarding is required</li>



<li>It works behind NAT, CGNAT, double NAT</li>



<li>It supports ACLs, MagicDNS, subnet routers</li>



<li>Free for up to 100 devices at this time</li>
</ul>



<p>Tailscale is great if you want an always-on private network where your laptop, phone, Raspberry Pi, and server all “see” each other like they’re on the same LAN.</p>



<p>I’ve used Tailscale to:</p>



<ul class="wp-block-list">
<li>Connect remote machines together without hassle</li>



<li>Connect to Home Assistant remotely</li>



<li>Access Proxmox web GUI on my phone</li>
</ul>



<p>It just works and the WireGuard-based performance is excellent. The main trade-off is that all devices must use Tailscale to communicate.</p>



<p><strong>3. Plain WireGuard</strong></p>



<p>For those that want a totally vanilla VPN solution, <a href="https://www.wireguard.com" target="_blank" rel="noreferrer noopener">WireGuard </a>is a great option. It’s the leanest, fastest VPN protocol out there. In fact many of the other solutions that we know and love are using Wireguard under the hood. And the great thing is that it is totally free and open-source.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="656" height="141" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-1.png" alt="" class="wp-image-479" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-1.png 656w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-1-300x64.png 300w" sizes="(max-width: 656px) 100vw, 656px" /></figure>



<p>You can use it to:</p>



<ul class="wp-block-list">
<li>Install it on Linux, routers, Docker containers</li>



<li>Set up point-to-site or site-to-site tunnels</li>



<li>Build roaming VPNs with static peers or dynamic endpoints</li>
</ul>



<p><strong>Why choose vanilla WireGuard:</strong></p>



<ul class="wp-block-list">
<li>Full control over the config</li>



<li>Zero cloud dependencies</li>



<li>Extremely fast and secure</li>



<li>Tiny footprint</li>
</ul>



<p>WireGuard is the most “bare metal” of the solutions here. If you’re comfortable editing config files and managing keys, it’s rock solid. <strong>WG-Easy </strong>is a solution I have written about before that makes configuring Wireguard much easier.</p>



<p><strong>4. Cloudflare Tunnel</strong></p>



<p>If you have a web service that you want to make available over the public Internet but you want to do this securely, Cloudflare tunnel is probably the right tool to use. Instead of opening ports like we have always done through the firewall, Cloudflare tunnels has you run a lightweight agent inside your home network (much like Twingate) that establishes a websockets over HTTPS tunnel outbound.</p>



<p>The cool thing is Cloudflare Tunnel can connect more than just HTTP web servers. It can connect&nbsp;SSH servers,&nbsp;remote desktops, and other protocols. Your “origin” servers serve the traffic through Cloudflare without being vulnerable to attacks that bypass Cloudflare. It then handles all the incoming requests made and routes them back to your internal network service.</p>



<p>If you want to make a service accessible via the public Internet, Cloudflare Tunnel is probably the right tool.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="694" height="433" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-2.png" alt="" class="wp-image-480" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-2.png 694w, https://web.abstechservices.co.uk/wp-content/uploads/2025/09/image-2-300x187.png 300w" sizes="(max-width: 694px) 100vw, 694px" /></figure>



<p><strong>Why it’s awesome to use:</strong></p>



<ul class="wp-block-list">
<li>No open ports, no NAT config</li>



<li>Built-in DDoS protection behind Cloudflare’s network</li>



<li>Automatic SSL with Let’s Encrypt</li>



<li>Supports access rules with Cloudflare Access</li>
</ul>



<p>With Cloudflare Tunnel, you can expose a service like Gitea, Portainer, or Grafana at https://myapp.mydomain.com, but only allow access to certain users or IPs. You can even integrate it with identity providers like GitHub or Google.</p>



<p>I’ve used this to:</p>



<ul class="wp-block-list">
<li>Share dashboards with others</li>



<li>Demos</li>



<li>Access services from mobile without VPN connections</li>



<li>Test webhooks or third-party integrations</li>
</ul>



<p>Just remember, with Cloudflare tunnels, this <strong>is still exposing your service to the public</strong>, but through a heavily protected proxy. It’s better than port-forwarding, but not as private as Twingate or Tailscale.</p>



<p><strong>Conclusion</strong></p>



<p>Exposing your home lab to the Internet is sometimes a sledgehammer approach that can work to get your services out there quickly, but from a security perspective, it is not worth it. I have self-hosted a few things that I have exposed directly to the Internet with firewall rules and other hardening, but given enough time and persistence, attackers can find a way to get into a machine, especially for dangerous services like RDP, etc.</p>



<p>Since there are great tools available out there for secure remote access for home lab, this is why I stopped exposing my home lab entirely. The services we have covered are what I think are some of the best and each has its strong suite. Whatever tool you choose, stop punching holes in your firewall and start using one of these modern solutions.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://web.abstechservices.co.uk/2025/09/05/how-to-reduce-your-network-exposure-to-the-internet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to protect your data online by using a password manager</title>
		<link>https://web.abstechservices.co.uk/2025/08/03/how-to-protect-your-data-online-by-using-a-password-manager/</link>
					<comments>https://web.abstechservices.co.uk/2025/08/03/how-to-protect-your-data-online-by-using-a-password-manager/#respond</comments>
		
		<dc:creator><![CDATA[AbsTechAdmin]]></dc:creator>
		<pubDate>Sun, 03 Aug 2025 07:22:05 +0000</pubDate>
				<category><![CDATA[Computing]]></category>
		<category><![CDATA[Guide]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Password]]></category>
		<guid isPermaLink="false">https://web.abstechservices.co.uk/?p=464</guid>

					<description><![CDATA[If you&#8217;re struggling to keep track of your online passwords, you&#8217;re not alone. Almost everything you do on the internet beyond simple web browsing requires a login. Some people use easy-to-remember passwords, while others have one complex password for all their accounts. Neither option is recommended since they make it easy for identity thieves and [&#8230;]]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p>If you&#8217;re struggling to keep track of your online passwords, you&#8217;re not alone. Almost everything you do on the internet beyond simple web browsing requires a login. Some people use easy-to-remember passwords, while others have one complex password for all their accounts. Neither option is recommended since they make it easy for identity thieves and other criminals to steal your credentials. A much better option is a password manager – but what are they, how do they work, and are they safe?</p>



<p><strong>What is a&nbsp;password manager?</strong></p>



<p>A password manager is software that helps users create strong passwords, store them in a digital vault protected by a single master password, and then retrieve them as needed when logging into accounts.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="698" height="392" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/08/image.jpeg" alt="" class="wp-image-465" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/08/image.jpeg 698w, https://web.abstechservices.co.uk/wp-content/uploads/2025/08/image-300x168.jpeg 300w" sizes="(max-width: 698px) 100vw, 698px" /></figure>



<p><strong>Should you use a password manager?</strong></p>



<p>Using a password manager certainly offers benefits. Password leaks have become common – that is, when websites are hacked, and user data such as usernames and passwords fall into the hands of criminals. If hackers obtain your login credentials, they can try them on other websites. If you use the same credentials across multiple websites, then a leak of one website’s data could enable criminals to access all your online accounts. That is why it’s essential to use strong and unique passwords for each website. A strong password comprises at least 12 characters – ideally more – and is a mix of upper- and lower-case letters, numbers, and symbols. It also avoids obvious or commonly-known information about you, such as your date of birth or names of family members.</p>



<p>However, most of us have many online accounts – one 2020 study suggested the average internet user has around 100 – so keeping tracking of numerous, long, complex passwords become difficult. That’s where password managers come in – they simplify the process by generating secure, random passwords for you and remembering them, so you don&#8217;t have to. Ultimately, the only password you need to remember is for the password manager itself.</p>



<p><strong>How does a password manager work?</strong></p>



<p>There are various password managers on the market. Once you’ve decided which one is right for you, the first thing to do is set it up and protect it with a master password. You will be keeping all your passwords in one place – i.e., in your digital vault – and your master password will be your key to that vault. Since your master password encrypts the contents of your vault, the password you choose must be a strong one. It&#8217;s also important not to lose it – otherwise, you will need to reset the passwords for all your online accounts – so make sure it’s something you won’t forget. On mobile devices, some password managers allow access via fingerprint or face ID.</p>



<p>Once the password manager is installed, it will capture your username and passwords and save them in your digital vault whenever you log into an app or site. A good password manager should keep track of any changes made to usernames and passwords within the vault and offer to update the stored information for that website or app. Many password managers use auto-fill – that is, they automatically fill in your login credentials on websites and apps when you visit the relevant pages.</p>



<p>As well as saving time, the autofill function can help alert you to phishing – for example, if you find yourself on a site that resembles your normal banking site, but the form fields don’t automatically populate with your login information, it could be a sign that you’re on a phishing website with a different URL, potentially using a typo squatting domain.</p>



<p>Password managers don’t just remember password information either: most password managers will also remember your personal information, such as name, address, and credit card details, and autofill these where appropriate on web forms. This saves time when carrying out a transaction like online shopping. A good password manager will also store documents, medical records, and photos in an encrypted vault which only you can unlock.</p>



<p>When creating new accounts, a password manager will offer to generate a new secure random password for you, which saves the hassle of creating new passwords each time. Good password managers should also let you know if existing passwords are weak or have been compromised in a data breach.</p>



<p>One way that users can maximize the security of their password manager is by enabling multi-factor authentication (MFA) to their accounts. MFA means that unlocking your password manager requires something in addition to your master password. This might be a fingerprint, facial recognition, a code sent to a mobile authenticator app, or a hardware security key.</p>



<p>Once you have created your master password and set up multi-factor authentication on your account, you can make your password manager easier to use by installing a browser extension. A good password manager will offer extensions for popular browsers.</p>



<p><strong>Are password managers safe?</strong></p>



<p>Given the information they hold – all your passwords, contact details, credit card details, and potentially other important documents – it&#8217;s reasonable to ask, how safe are password managers, and are password managers secure?</p>



<p>Some password managers can be hacked. But in those cases, there&#8217;s an important caveat: the information contained within your password manager should be encrypted. Assuming your password manager uses industry-standard encryption such as Advanced Encryption Standard (AES), it should be almost impossible for criminals to decipher the contents. While each password manager offers different features, it is generally true to say that password managers are safe to use.</p>



<p>The password managers themselves do not store or access your master password or the encrypted information in your password database. This provides an additional layer of security. A key aspect of password manager security lies in the strength of your master password – so it’s essential to choose something strong (and to keep it safe).</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="698" height="463" src="https://web.abstechservices.co.uk/wp-content/uploads/2025/08/image-1.jpeg" alt="" class="wp-image-466" srcset="https://web.abstechservices.co.uk/wp-content/uploads/2025/08/image-1.jpeg 698w, https://web.abstechservices.co.uk/wp-content/uploads/2025/08/image-1-300x199.jpeg 300w" sizes="(max-width: 698px) 100vw, 698px" /></figure>



<p><strong>Tips for choosing a password manager</strong></p>



<p>Here are some useful tips on choosing the right password manager for you:</p>



<ul class="wp-block-list">
<li>Choose software that has strong encryption.</li>



<li>Check for a lockout feature, which is helpful in case you forget your password.</li>



<li>Should something go wrong, be prepared to understand how the vendor will reach out to help you — telephone, email, or chat.</li>



<li>Check whether the software offers identity theft protection&nbsp;and whether it takes other measures to protect against other malicious behaviours.</li>



<li>Be comfortable using the software. Look into the usability of any password manager you are considering and ensure you will be able to integrate it with whatever devices or browsers you typically use.</li>



<li>Calculate the costs and benefits. A full-featured password management suite certainly brings the best value, but there are also&nbsp;free password manager&nbsp;applications that you can download as a trial to test your interest.</li>
</ul>



<p>A word on browser-based password managers. Some web browsers have integrated password managers. These tend not to compare favourably with dedicated password managers since they usually store passwords on your computer in an unencrypted form. This means that, unless you encrypt your computer&#8217;s hard drive, people could access the password files on your computer and view them. In addition, some browser-based passwords don&#8217;t automatically generate random passwords, and they may not offer cross-platform syncing.</p>



<p><strong>FAQs about password managers</strong></p>



<p><strong>How do password managers work?</strong></p>



<p>Password managers store all your passwords in a digital encrypted vault. When using a password manager, when you visit websites, the password manager will auto-fill the appropriate login information for that website. This means that you don’t have to remember your username, password, and email address for each website – the password manager does it for you.</p>



<p><strong>Why use a password manager?</strong></p>



<p>It&#8217;s recommended to use strong, unique passwords for each site you log into. But most of us have numerous passwords, and keeping track of them can be difficult. A password manager simplifies the process by generating secure, random passwords and remembering them, so you don&#8217;t have to. Ultimately, the only password you need to remember is for the password manager itself. In addition, most password managers will allow you to store documents, medical records, and photos in an encrypted vault that only you can unlock.</p>



<p><strong>How safe are cloud-based password managers?</strong></p>



<p>Most cybersecurity experts agree that cloud-based password managers are safe to use and, in fact, are the most secure way to store your passwords. A password manager with AES-256 encryption – that is, military-grade encryption – is almost impossible to crack. A good password manager should operate from a zero-knowledge principle – that is, the software creator should not know anything at all about your data, nor should anyone else. In addition, the ability to enable multi-factor authentication (MFA) on your password manager provides an additional layer of security. No matter which password manager you choose, avoid accessing it on public networks because your data can still be captured at any time.</p>



<p><strong>A password manager helps protect your data online</strong></p>



<p>When used daily, password managers are a convenient solution that can help secure your most private and sensitive information on the internet. There are various password managers on the market, and it&#8217;s worth taking the time to find one that is right for you. The right password manager will help to protect your data online.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://web.abstechservices.co.uk/2025/08/03/how-to-protect-your-data-online-by-using-a-password-manager/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is two-factor authentication (2FA)?</title>
		<link>https://web.abstechservices.co.uk/2025/02/24/what-is-two-factor-authentication-2fa/</link>
					<comments>https://web.abstechservices.co.uk/2025/02/24/what-is-two-factor-authentication-2fa/#comments</comments>
		
		<dc:creator><![CDATA[AbsTechAdmin]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 10:33:17 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[Computing]]></category>
		<guid isPermaLink="false">https://web.abstechservices.co.uk/?p=342</guid>

					<description><![CDATA[Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves. 2FA is implemented to better protect both a user&#8217;s credentials and the resources the user can access. It&#8217;s typically used as part of a broader effort to prevent [&#8230;]]]></description>
										<content:encoded><![CDATA[<!-- content style : start --><style type="text/css" data-name="kubio-style"></style><!-- content style : end -->
<p>Two-factor authentication (2FA), sometimes referred to as <em>two-step verification </em>or <em>dual-factor authentication</em>, is a security process in which users provide two different authentication factors to verify themselves.</p>



<p>2FA is implemented to better protect both a user&#8217;s credentials and the resources the user can access. It&#8217;s typically used as part of a broader effort to prevent data breaches and the potential loss of personal data.</p>



<p>Two-factor authentication adds an extra layer of security to the authentication process by making it harder for attackers to gain access to a person&#8217;s devices or online accounts. Even if the victim&#8217;s password is hacked, a password alone isn&#8217;t enough to pass the authentication check.</p>



<p>Two-factor authentication has long been a cybersecurity strategy to manage account security by controlling access to sensitive systems and data. Online service providers are increasingly using 2FA to protect users&#8217; credentials from being used by hackers who stole a password database or used phishing attacks to obtain user passwords.</p>



<p><strong>What are authentication factors?</strong></p>



<p>There are several ways in which someone can be authenticated using more than one authentication method. Most authentication methods rely on knowledge factors, such as a traditional password. Two-factor authentication methods add either a possession factor or an inherence factor.</p>



<p>Authentication factors, listed in approximate order of adoption for computing, include the following:</p>



<ul class="wp-block-list">
<li><strong>Knowledge factor.</strong> A knowledge factor is something the user knows, such as a password or a personal identification number (PIN).</li>



<li><strong>Possession factor.</strong> A possession factor is something the user has, such as an ID card, a security token, a mobile phone or a smartphone app, to approve authentication requests.</li>



<li><strong>Biometric factor.</strong> A biometric factor, also known as an inherence factor, is something inherent in the user&#8217;s physical self. It might be a personal attribute mapped from physical characteristics, such as fingerprints authenticated through a fingerprint reader. Other commonly used inherence factors include facial and voice recognition or behavioural biometrics, such as keystroke dynamics, gait or speech patterns.</li>



<li><strong>Location factor.</strong> A location factor is usually the location from which an authentication attempt is being made. Authentication attempts can be limited to specific devices in a particular location or the geographic source of an authentication attempt can be tracked based on the Internet Protocol address or some other geolocation information, such as Global Positioning System (GPS) data, derived from the user&#8217;s iPhone, Android phone or other mobile device.</li>



<li><strong>Time factor.</strong> A time factor restricts user authentication to a specific time window in which logging on is permitted and restricts access to the system outside of that window.</li>
</ul>



<p>Most two-factor authentication methods rely on knowledge, possession and biometric authentication factors. Systems requiring greater security use multifactor authentication (MFA), which relies on additional independent credentials for more secure authentication.</p>



<p><strong>How does two-factor authentication work?</strong></p>



<p>Enabling two-factor authentication varies depending on the specific application or vendor. However, two-factor authentication processes involve the same general, multistep process:</p>



<ol start="1" class="wp-block-list">
<li>The user is prompted to log in by the application or the website.</li>



<li>The user enters what they know, usually their username and password.</li>



<li>The site&#8217;s server finds a match and recognizes the user.</li>



<li>For processes that don&#8217;t require passwords, the website generates a unique security key for the user. The authentication tool processes the key and the site&#8217;s server validates it.</li>



<li>The site prompts the user to initiate the second login step. Although this step can take several forms, the user must prove that they have something only they would have, such as a biometric feature, security token, credit card, ID card, smartphone or other mobile device. This is the inherence or possession factor.</li>



<li>The user might have to enter a one-time passcode that was generated during Step 4.</li>



<li>After providing both factors, the user is authenticated and granted access to the application or website.</li>
</ol>



<p>Two-factor authentication involves two of three potential authentication factors.</p>



<p><strong>Elements of two-factor authentication</strong></p>



<p>Two-factor authentication is a form of MFA. Technically, it&#8217;s in use any time two authentication factors are required to gain access to a system or service. However, using two factors from the same category doesn&#8217;t constitute 2FA. For example, requiring a password and a shared secret is still considered SFA as they both belong to the knowledge authentication factor type.</p>



<p>SFA that relies on usernames and passwords isn&#8217;t the most secure. One problem with password-based authentication is it requires knowledge and diligence to create and remember strong passwords. Passwords require protection from insider threats, such as carelessly stored sticky notes with login credentials and carelessly discarded hard drives. Passwords are also prey to external threats, such as hackers using brute-force, dictionary or rainbow table attacks as well as social engineering exploits.</p>



<p>Given enough time and resources, an attacker can usually breach password-based security systems and steal corporate data. Passwords have remained the most common form of SFA on laptops and other devices because of their low cost, ease of implementation and familiarity.</p>



<p>Multiple challenge-response authentication questions can provide more security depending on how they are implemented. Standalone biometric verification methods can also provide a more secure method of SFA.</p>



<p>Adaptive multifactor authentication introduces a gatekeeper element into the process. The authentication system has knowledge of specific characteristics or patterns associated with a specific user. The process of authenticating a user’s identify starts when a user interacts with the adaptive authenticator app. The app analyses the user&#8217;s known characteristics and behaviour – for example, how many prior access requests have been made or a time-based analysis of when the requests were made &#8212; to determine if a match can be made. Once a match is confirmed, the user proceeds to the next step in authentication or access process.</p>



<p><strong>Types of two-factor authentication products</strong></p>



<p>There are many different devices and services for implementing 2FA, from tokens to radio frequency identification cards to smartphone apps.</p>



<p>Two-factor authentication products make use of two basic features:</p>



<ul class="wp-block-list">
<li>Tokens that are given to users to use when logging in.</li>



<li>Infrastructure or software that recognizes and authenticates access for users who are using their tokens correctly.</li>
</ul>



<p>Authentication tokens can be physical devices, such as key fobs or smart cards, or software, such as mobile or desktop apps that generate PIN codes for authentication. These authentication codes are known as <em>one-time passwords </em>(OTPs). The authentication code is a short sequence linked to a particular device, user or account and can be used only once as part of an authentication process. Servers generate OTPs, and authentication devices or apps are used to recognize them as authentic.</p>



<p>Organizations need to deploy a system to accept, process, and allow or deny access to users authenticating with their tokens. These systems can be deployed in the form of server software or as a dedicated hardware server. Third-party vendors also provide authenticating services.</p>



<p>An important aspect of 2FA is ensuring the authenticated user is given access to all resources they&#8217;re approved for and only those resources. As a result, one key function of 2FA is linking the authentication system with an organization&#8217;s authentication data.</p>



<p>Microsoft, for instance, supports 2FA in Windows 10 using Windows Hello, a non-password option for Microsoft accounts. It also authenticates users through Microsoft Active Directory, Azure AD and the Fast Identity Online 2 authentication protocol.</p>



<p><strong>Two-factor authentication for mobile devices</strong></p>



<p>A trusted mobile device is one that a specific user controls and regularly uses for transactions requiring secure access. The authentication system knows the device and, with that knowledge, uses it to bypass steps in the authentication process. For instance, a trusted phone number can be used to receive verification codes by text message or automated phone call. A user must verify at least one trusted phone number to enrol in mobile 2FA.</p>



<p>Smartphones offer a variety of 2FA capabilities, enabling companies to use what works best for them. Some devices can recognize fingerprints, use the built-in camera for facial recognition or iris scanning, or use the microphone for voice recognition. Smartphones equipped with GPS can verify location as an additional factor. Voice or Short Message Service (SMS) can also be used as a channel for out-of-band authentication.</p>



<p>Apple iOS, Google Android and Windows 11 all have apps that support 2FA, enabling the phone to serve as the physical device to satisfy the possession factor. Platforms such as Cisco Duo, Microsoft Authenticator and RSA Security SecurID let customers use their trusted devices for 2FA. They establish that a user is trusted before verifying that the mobile device can also be trusted as an authentication factor.</p>



<p>Authenticator apps replace the need to obtain a verification code using text, voice call or email. For example, to access a website or web-based service that supports Google Authenticator, users type in their username and password as their knowledge factor. They are then prompted to enter a six-digit number. Instead of having to wait a few seconds to receive a text message, an authenticator generates the number for them. These numbers change every 30 seconds and are different for every login. By entering the correct number, users complete the verification process and prove possession of the correct device, which is their possession factor.</p>



<p><strong>Authentication standards</strong></p>



<p>The following are open standard authentication protocols that form the basis for different authentication tools that support 2FA:</p>



<ul class="wp-block-list">
<li><strong>FIDO.</strong> The FIDO Alliance developed this open standard, which uses public key cryptography. It&#8217;s designed to eliminate the need for passwords, replacing them with phishing-resistant passkeys.</li>



<li><strong>OAuth 2.0.</strong> An abbreviation of open authorization, OAuth is an open standard that defines an authorization framework that protects system resources, such as files and applications. It provides authorization for application programming interfaces (APIs). It doesn&#8217;t support mobile applications.</li>



<li><strong>OpenID Connect (OIDC).</strong> Developed by the OpenID Foundation, OIDC adds layers to the OAuth 2.0 protocol that support authentication and identity management. It also supports mobile applications, APIs and browser-based apps.</li>



<li><strong>Security Assertion Markup Language (SAML).</strong> Developed by the Organization for the Advancement of Structured Information Standards, SAMLis an open standard for single sign-on access to browser-based applications such as web sites.</li>
</ul>



<p><strong>Push notifications for 2FA</strong></p>



<p>A push notification is password less authentication that verifies a user by sending a notification directly to a secure app on the user&#8217;s device, alerting the user that an authentication attempt is happening. The user can view details of the authentication attempt and either approve or deny access, typically with a single tap. If the user approves the authentication request, the server receives that request and logs the user in to the web app.</p>



<p>Push notifications authenticate the user by confirming that the device &#8212; usually a mobile device &#8212; registered with the authentication system is in the user&#8217;s possession. If an attacker compromises the device, the push notifications are also compromised. Push notifications eliminate threats such as unauthorized access, social engineering and man-in-the-middle attacks.</p>



<p>While push notifications are more secure than other forms of authentication, there are security risks. For example, users can accidentally approve a fraudulent authentication request because they are used to tapping approve when they receive push notifications.</p>



<p><strong>Is two-factor authentication secure?</strong></p>



<p>Two-factor authentication improves security, but these systems are only as secure as their weakest component. For example, hardware tokens depend on the security of the issuer or manufacturer. One of the most high-profile cases of a compromised two-factor system occurred in 2011 when security company RSA reported its SecurID authentication tokens had been hacked.</p>



<p>The account recovery process in these systems can also be subverted when it&#8217;s used to defeat two-factor authentication. Recovery processes often reset a user&#8217;s current password and emails a temporary password to enable the user to log in again, bypassing the 2FA process. The business Gmail accounts of the chief executive of Cloudflare were hacked in this way.</p>



<p>Although SMS-based 2FA is inexpensive, easy to implement and considered user-friendly, it&#8217;s vulnerable to numerous attacks. The National Institute of Standards and Technology (NIST) has discouraged the use of SMS in 2FA services in its &#8220;Special Publication 800-63-3 (2023): Digital Identity Guidelines.&#8221; NIST concluded that OTPs sent via SMS text are too vulnerable due to mobile phone number portability attacks, attacks against the mobile phone network and malware that can be used to intercept or redirect text messages.</p>



<p><strong>Future of authentication</strong></p>



<p>Environments that require higher security are starting to use three-factor authentication. It typically involves possession of a physical token and a password used in conjunction with biometric data, such as fingerprint scans or voiceprints. Factors such as geolocation, type of device and time of day are also used to determine whether a user should be authenticated or blocked.</p>



<p>Other authentication factors emerging include behavioural biometric identifiers, such as a user&#8217;s keystroke length, typing speed and mouse movements. These are discreetly monitored in real time to provide continuous authentication instead of a single one-off authentication check during login.</p>



<p>Relying on passwords as the main method of authentication is common. But it often no longer offers the security or user experience that companies and their user’s demand. Even though legacy security tools, such as a password manager and MFA, attempt to deal with the problems of usernames and passwords, they depend on an essentially outdated architecture: the password database.</p>



<p>Consequently, many organizations are turning to password less authentication. Methods such as biometrics and secure protocols let users securely authenticate themselves in applications without having to enter passwords. For businesses, this means employees can access their work without passwords while IT still maintains control across every login. In addition, blockchain use has brought attention to decentralized identifiers and self-sovereign identity as an alternative to traditional authentication methods.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://web.abstechservices.co.uk/2025/02/24/what-is-two-factor-authentication-2fa/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
