Ambimat GroupAmbimatAmbiSecureeSIM InitiativeEngineering BlogAhmedabad · India · Est. 1981

Why use Multi-factor Authentication?

Cybercriminals have billions of leaked records to play with. A second factor — especially a hardware-bound one — is what cuts off the long tail.

The problem with passwords

Every leaked password lives forever. The Have-I-Been-Pwned project alone tracks roughly twelve billion exposed credentials. Attackers don’t need to break your password — they just try a list of thirty thousand of yours and someone else’s, and one of them works. This is credential stuffing, and at scale it works often enough to be worth running 24/7 against most consumer services.

What a second factor adds

Multi-factor authentication asks for proof from at least two of these categories:

  • Knowledge factor — something you know (password, PIN, secret answer).
  • Possession factor — something you have (token, security key, phone).
  • Inherence factor — something you are (fingerprint, face, voice).

Even an SMS OTP raises the cost of credential-stuffing dramatically: the attacker now needs to also intercept (or social-engineer) a code in real time, per account. Most stop trying.

Not all second factors are equal

OTPs delivered by SMS or app are vulnerable to phishing pages: the attacker shows a fake login, harvests password + OTP, and replays them within the OTP’s 30-second window. Hardware-bound factors — FIDO2 security keys, smart cards, biometric tokens — are not vulnerable, because the cryptographic challenge is bound to the real origin. The phishing page can’t replay it.

What this means for you

If you are protecting an enterprise: your password-based auth has already been bypassed. The question is whether you know it yet. Layer on hardware-bound MFA — FIDO2 cards or USB keys — for any account that touches money, identity, or production access.

Related reading: Top 3 Benefits of MFA · Implementing FIDO2 (full developer guide) · OnePass Card (hardware authenticator).

Ready to deploy hardware MFA?

The OnePass Card replaces both the corporate badge and the security key. Pilot batches in 6–8 weeks.

Talk to us