@article {716, title = {Multifactor Authentication: Its Time Has Come}, journal = {Technology Innovation Management Review}, volume = {3}, year = {2013}, month = {08/2013}, pages = {51-58}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {Transactions of any value must be authenticated to help prevent online crime. Even seemingly innocent interactions, such as social media postings, can have serious consequences if used fraudulently. A key problem in modern online interactions is establishing the identity of the user without alienating the user. Historically, almost all online authentications have been implemented using simple passwords, but increasingly these methods are under attack. Multifactor authentication requires the presentation of two or more of the three authentication factor types: {\textquotedblleft}What you know{\textquotedblright}, {\textquotedblleft}What you have{\textquotedblright}, and {\textquotedblleft}What you are{\textquotedblright}. After presentation, each factor must be validated by the other party for authentication to occur. Multifactor authentication is a potential solution to the authentication problem, and it is beginning to be implemented at websites operated by well-known companies. This article surveys the different mechanisms used to implement multifactor authentication. How a site chooses to implement multifactor authentication affects security as well as the overall user experience.}, keywords = {authentication attacks, authentication mechanisms, multifactor authentication, online security}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/716}, url = {http://timreview.ca/article/716}, author = {Jim Reno} }