The past few years have seen an ever-increasing avalanche of high-profile and high-impact data breaches.
There are, of course, myriad different ways for bad players to access someone’s account nefariously but one of the more popular ways is via password infiltration — the genesis of a stolen password is somewhat irrelevant, since once the password falls into the wrong hands, access is absolute.
Which is why there is a move towards alternative or additional methods of authentication. In particular, two-factor authentication (2FA) has gained much attention in recent times. But while 2FA is effective, it is also, to be honest, a bit of a pain for users. Anything that increases the stress of users trying to log into services creates another barrier to increased security.