Multi-Factor Authentication for the Masses | Cyber Security Awareness Month

Trey Haraksin
3 min readOct 4, 2020

For cybersecurity awareness month (October) I thought I would compile a no-hassle list of popular apps and their documentation on how to set up Multi-Factor authentication (MFA). I will not be explaining MFA, as there are plenty of great articles on that already. First I’ll talk about and link the methods for MFA, as well as the applications for MFA, then I’ll list the popular applications that support MFA, as well as link their How-To’s for enabling your Software Token or SMS MFA. Click here to skip to the Apps. Click here to skip to the How-To’s.

MFA Methods

The most ubiquitous way to enable MFA is with Text Message (SMS, or Short Message Service) or Email One-Time Passwords (OTP). SMS/Email OTP is allowed by virtually everyone, including Banks, Social Media, and Business applications. The reason for SMS/Email OTP being such a ubiquitous form of MFA is the legacy nature of SMS/Email; with SMS/Email being around for such a long time, the process for securing, enabling, and auditing SMS/Email OTP has been established and thoroughly vetted by Federally- and Independently-regulated institutions.

The second most common form of MFA, and the preferred one in this article, is Software Token (Soft Token) OTP, which is usually an application that is installed on your mobile phone which allows storage of all your soft tokens in one place. Soft Tokens are not as common mainly due to their lack of Federal vetting, which is in turn caused its nascent quality.

The third, and least common form of MFA is Hardware Token (Hard Token) MFA, which is described as a hardware device with a unique signature, such as a USB key or microchip (such as the ones found in modern credit cards, but uniquely designed for authentication services). We won’t talk about these because they usually require a payment scheme and are not found in most commonly-used services.

MFA Apps

The most popular applications for Soft Token OTP are, in order of personal preference (taking into account ease-of-use, monopoly on services, and customization):

MFA How-To’s

The majority of this is taken from this amazing site: TwoFactorAuth.org. Here are some How-To’s for some of the most popular applications, by category:

Social Media

Finance

Cloud Backup and Storage

Messaging

Email

Gaming

Retail

--

--