Definition: 2-Factor Authentication

You have probably heard the words “2 Factor Authentication” (2FA), but do you understand the concept and the increased level of security they provide? (Even despite the mild annoyance factor.)  And do you know the preferred way to set it up for your WordPress website?

The basic idea is that logging in requires more than just your user/password combination.  User names can be fairly easy for a hacker to discover, and there are many tools available for them to obtain likely passwords – from brute force attacks to “dark web” sites which sell lists of user/password or email/password combos stolen during the unfortunately high number of breaches over the years.

So we add a second factor – something you HAVE, which the hackers probably don’t have: typically your phone or other device. You enter the code from your device as the last step of logging in.

Note: there are methods which involve sending a code to a designated email account or send an SMS text to your phone.  The downside is that the hacker may already have gained access to your email too.  And text messages can be intercepted, as happened in 2019 to the CEO of Twitter.  Yes, any 2FA is safer than no 2FA, but they’re not the safest way.

Right now (March 2020) the safest way to implement 2FA on your website is to use an Authenticator application – either on your phone or as a stand-alone device.

Some well known authenticators include:

Password managers 1Password and LastPass offer the service as well.

Rather than send you an SMS, each of these apps shows you a randomly generated six-digit code that refreshes roughly every 30 seconds, and stays constantly synced with whichever service you’re trying to log into. The benefits of tying those codes to a physical device, rather than your phone number, extend beyond security; apps like Google Authenticator generally continue to work even without an internet or cell connection. If 2FA has ever locked you out of Facebook on a flight, here’s some relief.

We suggest using one of the above Authenticators along with the 2FA available through Wordfence, which we install on all our clients’ sites.  Download the Authenticator of your choice, Log in to your site as an administrator, go to the Wordfence menu in the left hand navigation, and go to Login Security.  

You should now see a QR code (with a text key below it).  Follow the instructions at https://www.wordfence.com/help/tools/two-factor-authentication/ to get it set up.

It would be wise to require all Administrator and Editor level users on your site to implement 2FA. You get used to the extra step pretty quickly.

 

If you want to get really hard core, Yubico’s YubiKey is a hardware-based 2FA solution. It’s a small card-like device with one end that slots into a standard Type-A USB port. It can verify authentication with a button press instead of manually entering a short code. YubiKeys are also very durable and waterproof making it difficult to ruin these devices. These are probably the most secure solution overall, but to my knowledge Wordfence does not yet support YubiKey.

 

 

 

Definition: Window of Vulnerability

A Window of Vulnerability in terms of the world of security research exists from the time that the security hole is discovered by someone – be it the software developer, a security researcher, or a malicious player – until the time in which a fix has been released. During this time the ideal scenario is that the software vendor is made aware of the problem and feverishly works to fix it. Software developers are typically very quiet about exploits for which there is no fix yet.

A Window of Vulnerability in terms of the world of security research exists from the time that the security hole is discovered by someone – be it the software developer, a security researcher, or a malicious player – until the time in which a fix has been released. During this time the ideal scenario is that the software vendor is made aware of the problem and feverishly works to fix it. Software developers are typically very quiet about exploits for which there is no fix yet.

Definition: Zero Day

Zero Day exploits generally refer to a security hole in some software which someone has found and announced (or leaked, as the case may be) to the world, but the software developers don’t know about it yet or otherwise haven’t addressed the issue. They have literally had zero days to fix it before it becomes widely known.

The preferred course of action is that when a bug or exploit is discovered, the person or group who discovered it discreetly gets in touch with the developer, describes what they found and how it can be exploited, and gives the developer time to release a fix.