{"id":2110,"date":"2020-10-21T12:12:39","date_gmt":"2020-10-21T09:12:39","guid":{"rendered":"https:\/\/mailsafi.com\/blog\/?p=2110"},"modified":"2020-10-21T12:52:00","modified_gmt":"2020-10-21T09:52:00","slug":"two-factor-2fa-authentication-why-you-should-use-it","status":"publish","type":"post","link":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/","title":{"rendered":"Two-factor (2FA) Authentication: Why You Should Use It"},"content":{"rendered":"\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_49 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"ez-toc-toggle-icon-1\"><label for=\"item-69e9e5b55c71c\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-69e9e5b55c71c\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#1_What_is_Two-factor_Authentication\" title=\"1. What is Two-factor Authentication?\">1. What is Two-factor Authentication?<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#Scenario_1\" title=\"Scenario 1\">Scenario 1<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#Scenario_2\" title=\"Scenario 2\">Scenario 2<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#2_Understanding_the_types_of_authentication\" title=\"2. Understanding the types of authentication\">2. Understanding the types of authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#3_How_does_two-factor_authentication_work\" title=\"3. How does two-factor authentication work?\">3. How does two-factor authentication work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#4_Why_isn%E2%80%99t_Single-Factor_Authentication_SFA_enough\" title=\"4. Why isn\u2019t Single-Factor Authentication (SFA) enough?\">4. Why isn\u2019t Single-Factor Authentication (SFA) enough?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#5_Why_is_2FA_important_for_my_business_email\" title=\"5. Why is 2FA important for my business email?\">5. Why is 2FA important for my business email?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#6_Isn%E2%80%99t_2FA_Cumbersome_Will_it_make_my_email_more_secure\" title=\"6. Isn&#8217;t 2FA Cumbersome? Will it make my email more secure?\">6. Isn&#8217;t 2FA Cumbersome? Will it make my email more secure?<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#Scenario\" title=\"Scenario\">Scenario<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#7_Conclusion\" title=\"7. Conclusion\">7. Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"1_What_is_Two-factor_Authentication\"><\/span>1. What is Two-factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Two-factor authentication (2FA) &#8211; also known as two-step verification or dual-factor authentication or multifactor authentication (MFA) \u2013 is a method of establishing access to online accounts (including email accounts) that requires a user to provide two different types of information.<\/p>\n\n\n\n<p>For business, two-factor authentication is useful when accessing email via a web interface.<\/p>\n\n\n\n<p>A&nbsp;<em>factor<\/em>&nbsp;in this context means a way to prove to a system that you are who say you are so that the system can determine if you are authorized to access the account that you&#8217;re trying to access.<\/p>\n\n\n\n<p>When it comes to email, the most common authentication factor in use today is the username\/password pair. With two-factor authentication, you&#8217;ll need to&nbsp;both&nbsp;provide a password&nbsp;and&nbsp;prove your identity some other way to gain access.<\/p>\n\n\n\n<p>As passwords have become increasingly less secure, either because of data breaches or poor email security practices, many more business email users are moving to 2FA to secure their data. Many service providers encourage or mandate the shift as well.<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"Scenario_1\"><\/span><strong><u>Scenario 1<\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>You may not realize it, but you use two-factor authentication more often than you think. When you go to the supermarket checkout, swipe your debit card, and key in your PIN code, this is an example of two-factor authentication. You first produce the debit card, and second, you have to know your PIN code.<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"Scenario_2\"><\/span><strong><u>Scenario 2<\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Another example is when you go to the bank counter to withdraw cash from your bank account. The bank may require you to either;<\/p>\n\n\n\n<ol type=\"1\"><li>Write a check (which you sign), or,<\/li><li>Complete and sign a cash withdrawal request (which you also sign).<\/li><\/ol>\n\n\n\n<p>The bank will then ask you to show proof of your identity. Proof of identity may be in the form of your national identity card, passport, or other form of identity which has your passport photo (mugshot). In this case, your signature is the first factor, while your identity card is the second factor.<\/p>\n\n\n\n<p>Essentially, two-factor authentication requires two ways of proving your identity. This concept can then also be applied to protect your email accounts.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"2_Understanding_the_types_of_authentication\"><\/span><strong>2. Understanding the types of authentication<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>There are three types of authentication:<\/p>\n\n\n\n<ul><li><strong>Something you know<\/strong> &#8211; for instance, a password, PIN code, or answer to a security question (for example, mother&#8217;s maiden name, favorite pet, and so on).<\/li><li><span class=\"has-inline-color has-white-color\">x<\/span> <strong>Something you have<\/strong>: identity card, driver\u2019s license, debit or credit card, a phone, or fob.<\/li><li><strong>Something you are<\/strong>: biometrics (fingerprint, retina scan, face scan, or voice recognition).<\/li><\/ul>\n\n\n\n<p>Some systems also allow you to restrict access to email accounts by <strong>location<\/strong>. Setting restrictions by location means limiting authentication attempts to a specific device in a particular place (IP or GPS data). <\/p>\n\n\n\n<p>You may also use<strong> time<\/strong> as an authentication factor. A time factor restricts authentication to a specific time window. Outside that timeframe, it is not possible to log in.<\/p>\n\n\n\n<p>Location and time are useful for restricting access. However, we will limit our discussion to the first three types of authentication discussed above as the vast majority of 2FA methods rely on these. Systems requiring greater security can apply time or location as a factor to implement multifactor authentication (MFA).<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"3_How_does_two-factor_authentication_work\"><\/span><strong>3. How does two-factor authentication work?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>When it comes to email access, you&#8217;ll need to enter your username\/password \u2013 the first authentication factor. Next, you will have to either;<\/p>\n\n\n\n<ol type=\"1\"><li>Wait for a code \u2013 the second factor &#8211; to arrive via text message (SMS) on your phone. That is, you&#8217;ll get a text with a numeric code that you then need to enter to access your email account.<\/li><\/ol>\n\n\n\n<p>Unlike the PIN code for a debit card, a 2FA code is only valid for one-time use. It expires after a specified duration. Each time you log into your email, you will receive a new code.<\/p>\n\n\n\n<p>2. The second option is when you log in with a username\/password, you are asked for an authentication code &#8211; the second factor. Then you go to your phone, open your authentication app, and then key in the active code displayed on the screen. This code will expire after a few seconds, and a new code will be automatically generated. Popular authentication apps are Google Authenticator, Authy, and DuoMobile.<\/p>\n\n\n\n<p>This second step means a hacker needs to steal both your username\/password and your phone to access your account.<\/p>\n\n\n\n<p>Many service providers encourage their users to activate 2FA to protect their users\u2019 credentials from being used by hackers who have stolen a password database or used phishing to obtain user passwords.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.mailsafi.com\/email-hosting\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">MailSafi <\/span><\/a><\/strong>offers 2FA via<span class=\"has-inline-color has-black-color\"> <\/span><strong><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.apps.authenticator2&amp;hl=en&amp;gl=US\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">Google Authenticator<\/span><\/a><\/strong><span class=\"has-inline-color has-black-color\">.<\/span> If you haven\u2019t already, please read more about why using SMS (text message) for 2FA isn\u2019t such a great idea &#8211; here.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"4_Why_isn%E2%80%99t_Single-Factor_Authentication_SFA_enough\"><\/span><strong>4. Why isn\u2019t Single-Factor Authentication (SFA) enough?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Passwords have remained the most common form of SFA because of their low cost, ease of implementation, and familiarity. However, by their nature, passwords are limited when it comes to security for the following reasons:-<\/p>\n\n\n\n<ul><li>It requires knowledge and diligence to create and remember strong passwords.<\/li><li>Passwords require protection from many inside threats like carelessly stored sticky notes with login credentials, old hard drives, and social engineering exploits.<\/li><li>Passwords are prone to external threats, such as hackers using brute-force, dictionary, or rainbow table attacks.<\/li><\/ul>\n\n\n\n<p>Even enough time and resources, a hacker can usually breach many password-based security systems and steal corporate data.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"5_Why_is_2FA_important_for_my_business_email\"><\/span><strong>5. Why is 2FA important for my business email?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The username\/password pair has been the standard for everyday email access for generations now. Why now bother to make logging into your account more difficult?<\/p>\n\n\n\n<p>Well, over the years, widespread major data hacks have made it possible to put up millions of email usernames\/password pairs up for sale on the <strong><a href=\"https:\/\/www.csoonline.com\/article\/3249765\/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">dark web<\/span><\/a><\/strong> making many passwords less secure. Additionally, most people reuse passwords across multiple sites and accounts; a hacker can plug in known email address\/password pairs into dozens of sites and see which of them provides access. Verizon\u2019s 2017<strong><span class=\"has-inline-color has-vivid-cyan-blue-color\"> <\/span><a href=\"https:\/\/www.ictsecuritymagazine.com\/wp-content\/uploads\/2017-Data-Breach-Investigations-Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">Data Breach Investigations Report<\/span><\/a><\/strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">&nbsp;<\/span><\/p>\n\n\n\n<p>found that 81% of account breaches could be put down to passwords that were either leaked in this way or passwords that were so weak (e.g., &#8220;passw0rd&#8221;) that they were trivially easy to guess.<\/p>\n\n\n\n<p>Two-factor authentication adds an extra layer of security to the authentication process by making it harder for hackers to access a person&#8217;s account because knowing the user\u2019s password alone is not enough to pass the authentication check.<\/p>\n\n\n\n<p>Therefore, it is crucial to add a second layer of security \u2013 and the second layer must be <em>something you have<\/em> or <em>something you are<\/em>. It is not wise to combine two similar factors, i.e., <em>something you know<\/em> (like username\/password + your mother\u2019s maiden name). These are both knowledge-based authentication and do not represent true 2FA. You\u2019re just backing up something you know with something else you know. In essence, the answer to your security question is just another password and subject to all the same weaknesses. Both can be guessed or social engineered.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"6_Isn%E2%80%99t_2FA_Cumbersome_Will_it_make_my_email_more_secure\"><\/span><strong>6. Isn&#8217;t 2FA Cumbersome? Will it make my email more secure?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>2FA may be considered by some as cumbersome. However, we must agree that the small hassle of a second step of authentication pales compared to the stress of getting hacked.<\/p>\n\n\n\n<p>That said, it is important to understand that no security feature (for email or your house or otherwise) can claim to offer 100% foolproof protection. However, by combining two of the above three authentication types, you minimize the risk that a hacker will access your email account and gain access to confidential corporate data.<\/p>\n\n\n\n<p>You not only make your email accounts more difficult to attack, but you also make your accounts less attractive targets.<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"Scenario\"><\/span><strong><u>Scenario<\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Think of it in terms of home protection. If you have an electric fence, you lower the odds of a burglary. Also, if you have burglarproof doors\/windows, you lower the odds of a burglary. If you have a loud, large dog, you also reduce the odds of a burglary.<\/p>\n\n\n\n<p>However, if you combine burglarproof doors\/windows with a big dog, or burglarproof doors\/windows with an electric fence, your house becomes even more challenging to break into and, therefore, a less attractive target. Most burglars will find an easier mark &#8211; one without burglarproof doors\/windows, an electric fence, or a menacing dog.<\/p>\n\n\n\n<p>Likewise, two-factor authentication prevents a large portion of hackers from targeting your account; many hackers will move on and find easier accounts to compromise. Should they still choose to target you, they&#8217;ll need more than just your username\/password. In addition to your password, a hacker needs to have your phone also or access the tokens placed on your phone by the authentication mechanism via a phishing attack, malware, or activating account recovery. By activating account recovery, your password is reset, and 2FA is disabled. That&#8217;s a ton of extra work.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"7_Conclusion\"><\/span><strong>7. Conclusion<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Two-factor authentication provides a higher level of security than authentication methods that depend on&nbsp;single-factor authentication (SFA) in which the user provides only one factor &#8211; typically, a password.&nbsp;<\/p>\n\n\n\n<p>Although 2FA requires an extra step when logging into your email, it is a small price to pay (a few seconds to be precise) to minimize your<span class=\"has-inline-color has-vivid-cyan-blue-color\"> <\/span><strong><a href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">email&#8217;s risk of being compromised or hacked<\/span><\/a><\/strong>. Your email will undoubtedly be more secure with 2FA. Email security is especially crucial for businesses because their email most often have confidential information relating to the company or its clients.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\">MailSafi&#8217;s <strong><a href=\"https:\/\/www.mailsafi.com\/email-hosting#hosting-price\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">cloud-based email solution<\/span><\/a><\/strong> for business supports two-factor-authentication (2FA). It will allow your users to tighten security when they are accessing their emails via webmail. MailSafi also supports app-specific passwords for added security on mail clients such as Outlook, Thunderbird, and so on. <a href=\"https:\/\/www.mailsafi.com\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Contact us <\/span><\/strong><\/a>today for more information.<\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_2110\" class=\"pvc_stats all  \" data-element-id=\"2110\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>1. What is Two-factor Authentication? Two-factor authentication (2FA) &#8211; also known as two-step verification or dual-factor authentication or multifactor authentication (MFA) \u2013 is a method of establishing access to online accounts (including email accounts) that requires a user to provide two different types of information. For business, two-factor authentication is useful when accessing email via [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_2110\" class=\"pvc_stats all  \" data-element-id=\"2110\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":2120,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3],"tags":[219,198,220,218,217],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Two-factor authentication: How and why you should use it | MailSafi<\/title>\n<meta name=\"description\" content=\"Find out what two-factor authentication (2FA) is, how it works, why you should use it especially for business email, and how to set it up.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Two-factor authentication: How and why you should use it | MailSafi\" \/>\n<meta property=\"og:description\" content=\"Find out what two-factor authentication (2FA) is, how it works, why you should use it especially for business email, and how to set it up.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/\" \/>\n<meta property=\"og:site_name\" content=\"The MailSafi Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/msgafricaltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-21T09:12:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-21T09:52:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/two_factor_authentication.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"716\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"the_leaders\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:site\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"the_leaders\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/\"},\"author\":{\"name\":\"the_leaders\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\"},\"headline\":\"Two-factor (2FA) Authentication: Why You Should Use It\",\"datePublished\":\"2020-10-21T09:12:39+00:00\",\"dateModified\":\"2020-10-21T09:52:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/\"},\"wordCount\":1631,\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/two_factor_authentication.png\",\"keywords\":[\"2fa\",\"business email security\",\"MFA\",\"multi-factor authentication\",\"two-factor authentication\"],\"articleSection\":[\"Email Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/\",\"url\":\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/\",\"name\":\"Two-factor authentication: How and why you should use it | MailSafi\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/two_factor_authentication.png\",\"datePublished\":\"2020-10-21T09:12:39+00:00\",\"dateModified\":\"2020-10-21T09:52:00+00:00\",\"description\":\"Find out what two-factor authentication (2FA) is, how it works, why you should use it especially for business email, and how to set it up.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#primaryimage\",\"url\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/two_factor_authentication.png\",\"contentUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/two_factor_authentication.png\",\"width\":1280,\"height\":716,\"caption\":\"Two factor authentication for business email\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mailsafi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Two-factor (2FA) Authentication: Why You Should Use It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"name\":\"The MailSafi Blog\",\"description\":\"We Stop Spam\",\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailsafi.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\",\"name\":\"Message Labs Africa\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Message Labs Africa\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/msgafricaltd\/\",\"https:\/\/x.com\/msgafricaltd\",\"https:\/\/www.linkedin.com\/feed\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\",\"name\":\"the_leaders\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"caption\":\"the_leaders\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Two-factor authentication: How and why you should use it | MailSafi","description":"Find out what two-factor authentication (2FA) is, how it works, why you should use it especially for business email, and how to set it up.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/","og_locale":"en_US","og_type":"article","og_title":"Two-factor authentication: How and why you should use it | MailSafi","og_description":"Find out what two-factor authentication (2FA) is, how it works, why you should use it especially for business email, and how to set it up.","og_url":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/","og_site_name":"The MailSafi Blog","article_publisher":"https:\/\/www.facebook.com\/msgafricaltd\/","article_published_time":"2020-10-21T09:12:39+00:00","article_modified_time":"2020-10-21T09:52:00+00:00","og_image":[{"width":1280,"height":716,"url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/two_factor_authentication.png","type":"image\/png"}],"author":"the_leaders","twitter_card":"summary_large_image","twitter_creator":"@msgafricaltd","twitter_site":"@msgafricaltd","twitter_misc":{"Written by":"the_leaders","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#article","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/"},"author":{"name":"the_leaders","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14"},"headline":"Two-factor (2FA) Authentication: Why You Should Use It","datePublished":"2020-10-21T09:12:39+00:00","dateModified":"2020-10-21T09:52:00+00:00","mainEntityOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/"},"wordCount":1631,"publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/two_factor_authentication.png","keywords":["2fa","business email security","MFA","multi-factor authentication","two-factor authentication"],"articleSection":["Email Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/","url":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/","name":"Two-factor authentication: How and why you should use it | MailSafi","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#primaryimage"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/two_factor_authentication.png","datePublished":"2020-10-21T09:12:39+00:00","dateModified":"2020-10-21T09:52:00+00:00","description":"Find out what two-factor authentication (2FA) is, how it works, why you should use it especially for business email, and how to set it up.","breadcrumb":{"@id":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#primaryimage","url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/two_factor_authentication.png","contentUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/two_factor_authentication.png","width":1280,"height":716,"caption":"Two factor authentication for business email"},{"@type":"BreadcrumbList","@id":"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailsafi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Two-factor (2FA) Authentication: Why You Should Use It"}]},{"@type":"WebSite","@id":"https:\/\/mailsafi.com\/blog\/#website","url":"https:\/\/mailsafi.com\/blog\/","name":"The MailSafi Blog","description":"We Stop Spam","publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailsafi.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailsafi.com\/blog\/#organization","name":"Message Labs Africa","url":"https:\/\/mailsafi.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Message Labs Africa"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/msgafricaltd\/","https:\/\/x.com\/msgafricaltd","https:\/\/www.linkedin.com\/feed\/"]},{"@type":"Person","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14","name":"the_leaders","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","caption":"the_leaders"}}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2110"}],"collection":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/comments?post=2110"}],"version-history":[{"count":16,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2110\/revisions"}],"predecessor-version":[{"id":2127,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2110\/revisions\/2127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media\/2120"}],"wp:attachment":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media?parent=2110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/categories?post=2110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/tags?post=2110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}