What is MFA (Multi-Factor Authentication)?
Multi-factor authentication (MFA) is a security method that requires users to verify their identity using two or more independent credentials — typically something they know (a password), something they have (a phone or security key), and something they are (a fingerprint or face scan).
How MFA works
Three quick steps every time a user signs in from a new device or risky context.
Identify
The user enters a username and password. This is the first factor — something they know.
Prompt
The system prompts for a second factor: a code from an authenticator app, a push notification, or a tap on a hardware key.
Verify
If the second factor is valid, the user is authenticated. If it is missing or wrong, access is denied, even if the password was correct.
The four common types of MFA
Not all MFA is equal. Here is how the common methods compare from weakest to strongest.
SMS / text codes
A one-time code sent by text message. Better than nothing, but vulnerable to SIM-swap attacks and phishing proxies. Avoid for admins.
Authenticator apps (TOTP)
Time-based one-time codes from an app like Microsoft Authenticator or Google Authenticator. Offline-capable and phishing-resistant against many attacks.
Push notifications
The user approves a sign-in with a tap on their phone. Easy to use but vulnerable to MFA fatigue attacks — always pair with number matching.
Hardware security keys
FIDO2 keys like YubiKey, or device-bound passkeys. Phishing-resistant by design — the key will not authenticate against a fake domain.
Why SMBs need MFA
Passwords alone are no longer enough. Credential theft is now the most common way attackers get in.
Verizon DBIR 2024
Microsoft Security Research
Common MFA mistakes
- Enforcing MFA only on some accountsAttackers will find the exempt users. Apply MFA to everyone, including service accounts where possible.
- Using SMS for privileged accountsAdmins, finance, and anyone with access to money or sensitive data should use an app or hardware key — never SMS alone.
- No recovery plan for lost devicesWhen someone loses their phone, an undocumented reset process becomes a social-engineering target. Document it before you enforce MFA.
- Ignoring MFA fatigue attacksAttackers spam push notifications hoping the user taps "approve" out of frustration. Always enable number matching and additional context.
MFA frequently asked questions
LogicalNet services related to MFA
Related glossary terms
Conditional Access
Policies that adapt to device, location, and risk signals.
Zero Trust
A security model that verifies every request as if it came from an open network.
Least Privilege
Give users only the access they need — nothing more.
Phishing-Resistant MFA
FIDO2 keys and passkeys that cannot be proxied or replayed.
Need help rolling out MFA?
Talk to a LogicalNet identity expert. We will review your current environment, recommend the right MFA methods for each group of users, and help you deploy without disrupting the business.