Why use Multi-factor Authentication?
Cybercriminals have billions of leaked records to play with. A second factor — especially a hardware-bound one — is what cuts off the long tail.
The problem with passwords
Every leaked password lives forever. The Have-I-Been-Pwned project alone tracks roughly twelve billion exposed credentials. Attackers don’t need to break your password — they just try a list of thirty thousand of yours and someone else’s, and one of them works. This is credential stuffing, and at scale it works often enough to be worth running 24/7 against most consumer services.
What a second factor adds
Multi-factor authentication asks for proof from at least two of these categories:
- Knowledge factor — something you know (password, PIN, secret answer).
- Possession factor — something you have (token, security key, phone).
- Inherence factor — something you are (fingerprint, face, voice).
Even an SMS OTP raises the cost of credential-stuffing dramatically: the attacker now needs to also intercept (or social-engineer) a code in real time, per account. Most stop trying.
Not all second factors are equal
OTPs delivered by SMS or app are vulnerable to phishing pages: the attacker shows a fake login, harvests password + OTP, and replays them within the OTP’s 30-second window. Hardware-bound factors — FIDO2 security keys, smart cards, biometric tokens — are not vulnerable, because the cryptographic challenge is bound to the real origin. The phishing page can’t replay it.
What this means for you
If you are protecting an enterprise: your password-based auth has already been bypassed. The question is whether you know it yet. Layer on hardware-bound MFA — FIDO2 cards or USB keys — for any account that touches money, identity, or production access.
Related reading: Top 3 Benefits of MFA · Implementing FIDO2 (full developer guide) · OnePass Card (hardware authenticator).