Passwords alone are no longer sufficient protection. 2FA blocks over 99% of automated account takeover attacks. Here's how to implement it across your website and admin tools.
Passwords have been the primary authentication mechanism for websites since the 1960s. In 2025, they remain the weakest link in most organisations' security posture. The reasons are well-documented:
Microsoft's research found that accounts with multi-factor authentication enabled are 99.9% less likely to be compromised than those relying on passwords alone.
Two-factor authentication (2FA), also called multi-factor authentication (MFA), requires users to provide two separate forms of evidence before gaining access:
True 2FA requires factors from at least two different categories. A PIN plus a password are both "something you know" — that is not 2FA.
| Method | Security Level | Notes |
|---|---|---|
| SMS OTP | Low-Medium | Vulnerable to SIM-swapping; better than nothing |
| Email OTP | Low-Medium | Depends entirely on email account security |
| TOTP (Authenticator apps) | High | Google Authenticator, Authy, 1Password — offline, phishing-resistant |
| Push notifications | High | Duo, Microsoft Authenticator — convenient but requires internet |
| Hardware keys (FIDO2/WebAuthn) | Very High | YubiKey, Google Titan — phishing-proof, gold standard |
| Passkeys | Very High | Platform-native FIDO2 — passwordless and phishing-proof |
For most UK businesses, TOTP authenticator apps strike the right balance of security and usability. SMS 2FA is significantly better than no 2FA but should be considered a stepping stone rather than a final solution.
Prioritise these accounts:
If you are building or managing a web application that has user accounts, you should offer 2FA to your users. Implementation options:
For WordPress: Plugins like WP 2FA, Wordfence Login Security, or miniOrange provide TOTP 2FA with minimal configuration.
For custom applications: Libraries like speakeasy (Node.js) or pyotp (Python) implement TOTP. Pair with a QR code library for the setup flow.
For enterprise: Consider a dedicated identity provider (Auth0, Okta, AWS Cognito) that handles 2FA, SSO, and session management.
WebAuthn/Passkeys: The modern standard. Supported natively in all major browsers and operating systems. Completely phishing-proof because the credential is cryptographically bound to your domain.
The UK's Financial Conduct Authority (FCA) mandates Strong Customer Authentication (SCA) under the Payment Services Regulations 2017 for online payments — this is effectively mandatory 2FA for financial transactions. The ICO's guidance on UK GDPR also recommends MFA as an appropriate technical measure to protect personal data.
For businesses handling sensitive data, implementing 2FA on admin systems is increasingly considered a baseline expectation — not an optional extra.
WebGuard scans for exposed admin panels, default login paths, and missing security headers that affect authentication security. Run a free scan [blocked] to identify authentication-related vulnerabilities on your website.
Free scan, no account required. See exactly which issues affect your site.
Start Free ScanFrom missing security headers to exposed configuration files, these are the vulnerabilities WebGuard finds most frequently — and they're all fixable in under an hour.
WordPress powers 43% of the web and is the most targeted CMS by attackers. This practical guide covers the essential steps to harden your WordPress site against the most common attack vectors.
UK online retailers face GDPR fines, PCI DSS obligations, and increasingly sophisticated skimming attacks. Here's how to protect your customers and your business.