{"id":5527,"date":"2012-08-17T09:15:12","date_gmt":"2012-08-17T16:15:12","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=5527"},"modified":"2015-01-13T08:29:13","modified_gmt":"2015-01-13T16:29:13","slug":"what-is-multi-factor-authentication-and-how-will-it-change-in-the-future","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/","title":{"rendered":"What is Multi-Factor Authentication, and How Will It Change in the Future?"},"content":{"rendered":"<p><img style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/authentication-header1.jpeg\" alt=\"\" \/><\/p>\n<p>Are we all sick of password security lessons yet? After all the discussion of recent security breaches and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/\">Mat Honan\u2019s iCloud account hack<\/a>, it seems like even mainstream media is all over the password security quandary. And a lot of the coverage seems pretty bleak. But it\u2019s not really as bad as all that, and there are actually some really interesting developments in this space that could drastically change authentication as we know it.<\/p>\n<h3>The Imperfect Present Situation<\/h3>\n<p>No security system, whether it\u2019s related to passwords or malware or data leakage or whatever other hot new piece of technology du jour is, will protect you 100%. More and more, humans are the weak link in the chain. You could build a totally indestructible robot army to protect you, but if you hand over the remote control, that army can be turned right around to destroy you. And people are <a href=\"http:\/\/money.cnn.com\/2012\/08\/07\/technology\/walmart-hack-defcon\/index.htm\">handing over that remote control<\/a> way too often.<\/p>\n<p>So, what do we do in light of this imperfect situation? We use layers of security to try to eliminate the number of holes that it\u2019s possible for intruders to squeeze through; each successive layer should help cover up places where other layers are weak. We can also try to make our security just a little bit better than that next guy, because criminals will always go for the biggest return on their effort. We want to make ourselves an unattractive target, comparatively speaking.<\/p>\n<p>Honan\u2019s hack was a vivid example of aligning all sorts of security holes that allowed attackers to crash a Mack Truck into his digital life. There were a couple of the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/\">four lessons we covered<\/a> that would have easily stopped this alignment. The first was setting up two-factor authentication in Google \u2013 that was the first key element in the alignment. The second was how much work Honan did <em>for them<\/em>, by linking so many of his accounts \u2013 they didn\u2019t have to align any more holes, because Honan had done it already.<\/p>\n<h3>So, What is Two-Factor Authentication?<\/h3>\n<p>Let\u2019s back up a bit first. There\u2019s commonly considered to be three types of things you can use to verify that you are who you say you are. By far the most common of these things revolves around \u201cwhat you know\u201d \u2013 that is usually something like a username and password that you have chosen to remember. The other two types are about \u201cwhat you have,\u201d such as a piece of hardware like a phone or a key fob, and \u201cwhat you are,\u201d such as a fingerprint scan.<\/p>\n<p>One-factor authentication uses only one of these things to authenticate your identity. That doesn\u2019t mean there is only one thing you\u2019re entering to prove your identity. A good example of this is Secret Questions. You can have 10 questions about where you grew up or what your favorite car is or what your mom eats for breakfast, but if you are the one supplying the answer, it\u2019s all just single-factor authentication.<\/p>\n<p>Multi-factor authentication involves two or more of the different types of authentication. Two-factor authentication is already used by a large number of financial institutions outside the US, particularly in Europe. Google and Facebook have both enabled two-factor authentication too. It won\u2019t be long until this is considered very commonplace on any sort of online service that stores your really important data.<\/p>\n<p>The most common type of online two-factor authentication involves sending you a temporary key (to your phone, a dongle, an email address, etc.) that you will input along with your username and password. In the real world, having to input an ATM card and a PIN is another type of two-factor authentication. This is still not bulletproof, and it definitely increases the possibility of people being locked out of their accounts if you lose access to the thing that allows you to receive the temporary key. Some people are already saying that two-factor authentication has passed its prime as <a href=\"http:\/\/news.techworld.com\/security\/3375826\/attack-on-airport-vpn-bypassed-multi-factor-authentication-security-firm-reports\/?olo=rss\">we&#8217;re already seeing it being breached<\/a>. So more and more organizations are now looking into three-factor identification.<\/p>\n<p>The third type of authentication is still fairly uncommon in the online world. You will occasionally see a thumbprint scanner on a laptop, but I don\u2019t believe I\u2019ve seen this used by anyone in everyday life. I had a friend who worked for a major hardware manufacturer that issued computers that had keyboards with thumbprint scanners\u00a0to all its employees, and then they disabled the scanner on all of them. While one might think such a scanner would be fairly simple, apparently the technology ended up being sort of problematic. The value in terms of increasing their security wasn\u2019t equal to the cost of the support calls it generated for them.<\/p>\n<h3>Authentication for the Future<\/h3>\n<p>If we\u2019re already seeing breaches in the most common two-factor authentication methods and that third factor doesn\u2019t seem to be ready for prime time, what are we supposed to do? There are a lot of people looking into that very question, and they\u2019re coming up with some very interesting and creative answers.<\/p>\n<p>One of those answers is to come up with some other data that we could use to help identify ourselves. Besides what we know, what we have and what we are, we can also provide information about <em>where<\/em> we are. This could be a WiFi base station, a GPS location, or an IP address, for instance.<\/p>\n<p>This is not terribly specific information in most cases, as very few people use static IP addresses or stand in one spot while they&#8217;re using their mobile phones. But there are instances where this could be useful when you create a sort of profile out of users\u2019 behaviors.<\/p>\n<p>Credit card companies do something like this when they look for patterns that indicate fraud: Have you ever had a credit card company call you to verify if it was actually you who made a purchase at Tiffany\u2019s in Arizona to send to Maryland, when you live in rural Iowa? It fails to meet the criteria for where and who you are if you\u2019ve never made purchases in either state or at Tiffany\u2019s. This example relies on a new view of what is considered \u201cwho you are.\u201d What makes us unique is not just visible in the physical sense, but also in the behavioral sense.<\/p>\n<p>There has been a lot of research into privacy implications of retaining or mining people\u2019s surfing and searching habits. <a href=\"http:\/\/news.cnet.com\/8301-1023_3-57484984-93\/your-web-browsing-history-is-totally-unique-like-fingerprints\/\">One such study<\/a> recently reiterated that our online behaviors are a pretty conclusive way to identify someone. Obviously this would have to be done very cautiously to get a balance of preserving privacy while maintaining accuracy. This may not be what\u2019s traditionally considered \u201c<a href=\"http:\/\/en.wikipedia.org\/wiki\/Personally_identifiable_information\">personally identifiable information<\/a>\u201d \u2013 it may not allow a hacker to take over your bank account or a stalker to find where you live, but it can be used to incriminate you in other ways.<\/p>\n<p>All in all, what we\u2019re seeing in all these mainstream articles about the bleakness of password security is not news to those of us in the security industry. Computer security at this point is unbelievably complicated and it\u2019s very hard to boil that down into simple recommendations for average users. But there are some really cool things that are coming down the pipe that could make things much easier and perhaps even more convenient. Until then, we should all be vigilant about what security steps we can take.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are we all sick of password security lessons yet? After all the discussion of recent security breaches and Mat Honan\u2019s iCloud account hack, it seems like even mainstream media is all over the password security quandary. And a lot of the coverage seems pretty bleak. But it\u2019s not really as bad as all that, and [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":35563,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10,151],"tags":[351,353,325],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Are we all sick of password security lessons yet? After all the discussion of recent security breaches and Mat Honan\u2019s iCloud account hack, it seems like\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Multi-Factor Authentication, and How Will It Change in the Future? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Are we all sick of password security lessons yet? After all the discussion of recent security breaches and Mat Honan\u2019s iCloud account hack, it seems like\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-08-17T16:15:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-01-13T16:29:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/two-factor-authentication.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/two-factor-authentication.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/two-factor-authentication.jpeg\",\"width\":400,\"height\":260,\"caption\":\"two-factor authentication\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/\",\"name\":\"What is Multi-Factor Authentication, and How Will It Change in the Future? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#primaryimage\"},\"datePublished\":\"2012-08-17T16:15:12+00:00\",\"dateModified\":\"2015-01-13T16:29:13+00:00\",\"description\":\"Are we all sick of password security lessons yet? After all the discussion of recent security breaches and Mat Honan\\u2019s iCloud account hack, it seems like\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Multi-Factor Authentication, and How Will It Change in the Future?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"What is Multi-Factor Authentication, and How Will It Change in the Future?\",\"datePublished\":\"2012-08-17T16:15:12+00:00\",\"dateModified\":\"2015-01-13T16:29:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#webpage\"},\"wordCount\":1267,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/two-factor-authentication.jpeg\",\"keywords\":[\"Multi-Factor Authentication\",\"Password Security\",\"Two-Factor Authentication\"],\"articleSection\":[\"How To\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Are we all sick of password security lessons yet? After all the discussion of recent security breaches and Mat Honan\u2019s iCloud account hack, it seems like","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/","og_locale":"en_US","og_type":"article","og_title":"What is Multi-Factor Authentication, and How Will It Change in the Future? - The Mac Security Blog","og_description":"Are we all sick of password security lessons yet? After all the discussion of recent security breaches and Mat Honan\u2019s iCloud account hack, it seems like","og_url":"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-08-17T16:15:12+00:00","article_modified_time":"2015-01-13T16:29:13+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/two-factor-authentication.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/two-factor-authentication.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/two-factor-authentication.jpeg","width":400,"height":260,"caption":"two-factor authentication"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/","name":"What is Multi-Factor Authentication, and How Will It Change in the Future? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#primaryimage"},"datePublished":"2012-08-17T16:15:12+00:00","dateModified":"2015-01-13T16:29:13+00:00","description":"Are we all sick of password security lessons yet? After all the discussion of recent security breaches and Mat Honan\u2019s iCloud account hack, it seems like","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What is Multi-Factor Authentication, and How Will It Change in the Future?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"What is Multi-Factor Authentication, and How Will It Change in the Future?","datePublished":"2012-08-17T16:15:12+00:00","dateModified":"2015-01-13T16:29:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#webpage"},"wordCount":1267,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/two-factor-authentication.jpeg","keywords":["Multi-Factor Authentication","Password Security","Two-Factor Authentication"],"articleSection":["How To","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/what-is-multi-factor-authentication-and-how-will-it-change-in-the-future\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/two-factor-authentication.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1r9","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5527"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=5527"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5527\/revisions"}],"predecessor-version":[{"id":13569,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5527\/revisions\/13569"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/35563"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=5527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=5527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=5527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}