

Experts classify authentication factors in three groups: MFA means you add another factor in addition to that password. Twilio Authy ReviewĪs the name implies, MFA means you use more than one type of authentication to unlock an online account or app.

At least there's an Apple Watch app for those who want it. Authy’s Help Center offers a strategy to mitigate the vulnerability, but we'd prefer it just worked more like other authenticator apps. We're not fans of this requirement, since we’d rather have the app consider our phones to be anonymous pieces of hardware and some have suggested that requiring a phone number opens the app up to SIM-card-swap fraud. Unlike the other apps listed here, Authy requires your phone number when you first set it up. It also means that authorities cannot force Authy to unlock your accounts. The password is only known to you, so if you forget it, Authy won’t be able to recover the account. There’s also an option to enter a private password or passphrase which Authy uses to encrypt login info for your accounts to the cloud. However, it’s somewhat concerning that you can add the account to a new phone using “a PIN code sent via a call or an SMS,” according to Authy’s support pages (Opens in a new window). One of Twilio Authy’s big advantages is encrypted cloud backup.

Below our recommendations, you'll find more information on just how these apps work to keep you safe, as well as criteria you should consider when choosing one.

If you're looking for the best free authenticator app, you're in luck. Our summaries of the best authenticator apps, listed alphabetically, will help you decide which one to use so you can start setting up your accounts to be more secure. Enabling MFA is also one of the steps our team recommends to protect yourself from the consequences of a data breach, and it's among the steps you should take if you discover your information has already been involved in a breach. Using one of these apps can even help protect you against stealthy attacks like stalkerware. The security coverage team at PCMag frequently exhorts readers to use MFA.Īuthenticator apps, such as Authy, Google Authenticator, and Microsoft Authenticator, enable one of the more secure forms of it. Multi-factor authentication (MFA, also known as two-factor authentication or 2FA) adds another layer of protection. Leaks and hacks from recent years make it clear that passwords alone don't provide enough security to protect your online banking, social media logins, or even accounts for websites where you shop. How to Set Up Two-Factor Authentication.How to Record the Screen on Your Windows PC or Mac.How to Convert YouTube Videos to MP3 Files.How to Save Money on Your Cell Phone Bill.How to Free Up Space on Your iPhone or iPad.How to Block Robotexts and Spam Messages.
