Two-Factor Authentication (2FA) is indispensable in protecting against cybercrime, as passwords alone are no longer secure enough. 2FA offers additional protection through a second authentication factor such as SMS codes, biometrics or security keys. Cybercriminals have developed a variety of attack methods, such as phishing or ransomware, making data protection increasingly important for companies and private individuals.
Table of contents
In today's digital world, companies and individuals are facing ever greater challenges when it comes to protecting sensitive data. Passwords alone no longer provide sufficient security, as cybercriminals are constantly developing new methods to crack or steal them. This is where Two-Factor Authentication (2FA) comes into play, providing an additional shield against unauthorized access and thus becoming an indispensable part of modern security strategies.
In addition to the password, this technology requires a second form of proof, such as a code from an authenticator app or a security key. Below, we take a look at the growing threat of cybercrime and explain why 2FA is an effective protection measure. We also look at how legal requirements are influencing the adoption of Multi-Factor Authentication and what advantages this method offers over traditional authentication methods.
The digital world has become a battleground where cybercriminals are using increasingly sophisticated methods to infiltrate systems and steal sensitive data.
In its Digital Defense 2023 report, Microsoft sounded the alarm and called on companies to be more vigilant 1. This warning is no coincidence, as the threat landscape has changed dramatically in recent years.
The figures speak for themselves: cybercrime causes enormous economic damage every year. Cybercrime leads to considerable economic losses every year. A study by the industry association Bitkom e.V. found that the total damage caused by cyber attacks amounted to 148 billion euros in 2023 2. This figure illustrates the immense financial burden that companies and organizations have to bear as a result of cyberattacks.
The increase in so-called foreign crimes is particularly worrying. These cybercrimes, which are committed from outside Germany or from unknown locations but result in damage in Germany, have increased continuously since they were first recorded in 2020. In 2023, an increase of 28% was recorded compared to the previous year 2. This shows that cybercrime is a global problem that does not stop at national borders.
However, there is a positive trend in the clearance rate. In 2023, this rose by three percentage points to 32.2% 2. This indicates that law enforcement agencies are improving their ability to combat cybercrime.
Cybercriminals use a variety of methods to penetrate systems and cause damage. The most common attack vectors include:
The BSI has also registered a worrying increase in vulnerabilities in software products. With an average of almost 70 new vulnerabilities per day, an increase of around 25% was recorded compared to the previous year. It is particularly alarming that around one in six of these vulnerabilities is classified as critical 5.
The effects of cyberattacks and data leaks on companies are diverse and often devastating:
The increasing professionalization of cybercrime, particularly through the concept of "cybercrime-as-a-service", presents companies with new challenges 5. To counter these threats, it is essential to invest in cyber security, train employees and promote a culture of vigilance. This is the only way for companies to protect their digital assets and ensure the integrity of their systems.
Two-Factor Authentication (2FA) has proven to be an effective method to significantly improve the security of online accounts. It requires users to confirm their identity through two different components, which significantly increases protection against unauthorized access 6. This additional layer of security makes it much harder for cybercriminals to gain access to sensitive information, even if they have cracked a user's password 7.
There are a variety of 2FA methods that can be used depending on requirements and preferences:
The various 2FA methods offer different levels of security:
It is important to note that true 2FA systems use two factors from different categories to maximize security 6.
Despite the increased security, the implementation of 2FA can affect the user experience:
To increase acceptance, it is advisable to activate 2FA as soon as an online service enables it 9. Although this function is deactivated by default for many services, it is still available. It is therefore advisable to check the login methods 9.
Despite possible inconveniences, the German Federal Office for Information Security (BSI) strongly advises against deactivating Two-Factor Authentication 9. The advantages of increased security clearly outweigh the minor disadvantages of using it.
In summary, Two-Factor Authentication (2FA) is an extremely effective security measure that significantly reduces the risk of unauthorized access, even if the password has been stolen 8. It makes phishing attacks more difficult and increases users' confidence in the protection of their accounts 8. Although the implementation and use of 2FA can present certain challenges, the security benefits far outweigh the potential inconveniences.
The General Data Protection Regulation (GDPR) forms the legal framework for the protection of personal data in the European Union. Although the GDPR does not make any specific technical provisions, it requires that an adequate level of data protection must be ensured 11. This can be achieved through technical organizational measures (TOM), which include securing systems with a login 11.
In this context, traditional authentication with a user name and password can be sufficient in many cases 11. However, Two-Factor Authentication (2FA) offers a higher level of security. Depending on the type of data processed and the existing risks, it may therefore be advisable to opt for 2FA 11.
In the area of information security, 2FA is becoming increasingly important. In the SME sector in particular, more and more companies are seeking certification or want to maintain it 11. Depending on the chosen standard, it may be necessary to secure access via 2FA as part of information security 11.
In the e-commerce sector, the situation has changed fundamentally as a result of the European Union's revised Payment Service Directive II (PSD II). This directive requires strong customer authentication for all electronic payments 12.
This means that purchases in online stores that are paid for by credit or debit card, PayPal or Klarna must be approved with Two-Factor Authentication 12.
PSD II stipulates that the identity of the payer must be verified on the basis of at least two factors from the following three categories (12):
Although the responsibility for implementing this procedure lies mainly with payment providers such as banks, credit card companies, PayPal or Klarna, online merchants should ensure that the payment methods they offer comply with the new guidelines 12.
It should be noted that the German Federal Financial Supervisory Authority (BaFin) has granted a temporary deferral for card payments 13. Despite this postponement, the national regulations of the Payment Services Supervision Act (ZAG) have applied as planned since September 14, 2019 13. Section 55 ZAG, which regulates Two-Factor Authentication, is likely to be regarded as a market conduct rule and therefore relevant under fair trading law 13.
Failure to implement 2FA can result in significant liability risks for companies. Although 2FA is not required by law in all areas, it is increasingly recommended as best practice 14. Companies that do not implement adequate security measures risk not only financial damage, but also reputational damage in the event of a cyberattack 14.
Stricter regulations apply in certain sectors. In the financial sector, PSD2 requires strong customer authentication for all electronic payments, for example to prevent the misuse of credit cards 14. In healthcare, the Health Insurance Portability and Accountability Act (HIPAA) regulations in the US require the use of a second factor to protect electronic patient data 14.
In light of the increasing number of cyberattacks and data breaches, the introduction of strong authentication methods is becoming more and more important. Governments and regulators are placing increasing emphasis on user security, which is putting pressure on companies to implement more secure authentication methods 14.
The German Federal Office for Information Security (BSI) strongly recommends setting up and using Two-Factor Authentication where possible 15. This underlines the growing importance of 2FA as a security standard.
In summary, it can be said that the legal requirements for 2FA vary depending on the industry and use case. While it is already mandatory in some areas, such as e-commerce, it is increasingly seen as best practice in other areas. Companies should carefully consider the implementation of 2FA to minimize legal risks and ensure the security of their systems and customer data.
With Microsoft, Multi-Factor Authentication (MFA) comes into play, which is an enhanced and more flexible form of 2FA. Microsoft 365 (M365) seamlessly integrates MFA and provides an additional layer of security by requiring another verification step in addition to the password. This can be done via an authentication app, SMS, phone call or hardware token, for example 16.
This is how MFA works with M365 16:
Administrators can enforce MFA (Multi-Factor Authentication) in Microsoft 365 through Conditional Access for specific scenarios and user groups. Conditional access makes it possible to require MFA only under certain conditions, based on various factors such as user location, device status or application access.
Here are some of the conditions under which admins can enforce MFA 16:
These conditional access rules allow for a flexible and customized MFA implementation that increases the level of security without making user access unnecessarily difficult.
Two-Factor Authentication has proven to be an effective protective measure against the growing threats in the digital space. It provides an additional layer of security that makes it much more difficult for cybercriminals to gain unauthorized access to sensitive data. Given the variety of methods by which passwords can be cracked or stolen, 2FA is proving to be a more reliable option than any password, no matter how complex. The increasing use of 2FA in various areas, from e-commerce to corporate networks, underlines its importance in modern cyber security.
To improve digital security, it is crucial that organizations and individuals take advantage of 2FA or MFA and incorporate it into their security strategies. Although implementation can be challenging at first, the long-term benefits far outweigh the short-term inconveniences. As digitalization progresses and threats continue to evolve, multi-factor and Two-Factor Authentication will undoubtedly play a key role in protecting digital identities and data.
[1] - https://www.microsoft.com/de-de/security/security-insider/microsoft-digital-defense-report-2023 [2] - https://www.bka.de/DE/AktuelleInformationen/StatistikenLagebilder/Lagebilder/Cybercrime/2023/CC_2023.html [3] - https://www.ecos.de/blog/auswirkungen-von-cyberangriffen-was-man-wissen-sollte [4] - https://www.rapid7.com/de/cybersecurity-grundlagen/types-of-attacks/ [5] - https://www.bsi.bund.de/DE/Service-Navi/Publikationen/Lagebericht/lagebericht_node.html [6] - https://www.ibm.com/de-de/topics/2fa [7] - https://secutain.com/wissen/einfach-erklaert-wie-funktioniert-die-2-faktor-authentifizierung [8] - https://www.ftapi.com/glossar/zwei-faktor-authentifizierung/ [9] - https://www.bsi.bund.de/DE/Themen/Verbraucherinnen-und-Verbraucher/Informationen-und-Empfehlungen/Cyber-Sicherheitsempfehlungen/Accountschutz/Zwei-Faktor-Authentisierung/zwei-faktor-authentisierung_node.html [10] - https://nachrichten.idw-online.de/2024/03/13/neuer-ansatz-um-den-prozess-der-zwei-faktor-authentifizierung-auf-websites-zu-vergleichen [11] - https://www.hub24.de/blog/2-faktor-authentisierung/ [12] - https://ixtenso.de/technologie/fuer-mehr-sicherheit-bei-online-zahlungen.html [13] - https://business.trustedshops.de/blog/legal/psd2-zwei-faktor-authentifizierung-verpflichtend-oder-nicht [14] - https://www.cidaas.com/de/blog/zwei-faktor-authentifizierung-pflicht/ [15] - https://www.bsi.bund.de/DE/Themen/Verbraucherinnen-und-Verbraucher/Informationen-und-Empfehlungen/Cyber-Sicherheitsempfehlungen/Accountschutz/Zwei-Faktor-Authentisierung/Bewertung-2FA-Verfahren/bewertung-2fa-verfahren_node.html [16] - https://learn.microsoft.com/de-de/entra/identity/conditional-access/concept-conditional-access-policy-common?tabs=secure-foundation