Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

12/11/2019
12:35 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Younger Generations Drive Bulk of 2FA Adoption

Use of two-factor authentication has nearly doubled in the past two years , pointing to a new wave of acceptance.

Adoption of two-factor authentication (2FA) is rapidly increasing, particularly among people aged 18-34, as consumers grow concerned with protecting online accounts from data breaches.

When Duo Labs researchers set out to learn more about adoption and perception of 2FA in 2017, they learned 56% of Americans polled had never heard of the technology. Only 28% used 2FA on at least one website or app. Over the past two years, that adoption has increased - reaching 51%.

In their new State of the Auth report released this week, Duo analysts shared the results of a second census-representative survey designed to measure 2FA usage in the United States. By 2019, the researchers found, 77% of people surveyed had heard of 2FA, up from 44% two years prior.

Sean Frazier, Advisory CISO with Duo, says there are several reasons why consumers have become more familiar with 2FA. "Now, people are starting to see these things in their personal lives," he explains. Banks and tech companies are encouraging customers to use 2FA for accounts and devices. Newscasters reporting on data breaches now mention 2FA as an option for stronger consumer security.

"You're seeing it come up in basic conversations about security hygiene," Frazier continues. Indeed, much has changed in the years since Duo's initial poll: Apple released Face ID in its iPhone X, GDPR was fully enforced throughout the EU, and WebAuth was published as a W3C recommendation. Businesses have increasingly implemented 2FA requirements for employees, broadening adoption.

These shifts arrive at a time when a growing amount of data points to the unreliability of password-based authentication. Only 32% of US respondents to the Duo survey reported using strong, complex passwords. Password reuse, rampant among consumers and security pros alike, is at the core of incidents like the compromise of developer repositories on Bitbucket, GitHub, and GitLab.

SMS-based authentication remains the most popular 2FA factor at 72% usage, followed by email (57%), authenticator app (36%), and phone callback (30%). SMS was also the most popular answer when respondents were asked about their preferred authentication factor, indicating their familiarity with this option makes it more convenient and appealing.

"We want to make sure that even though we have to add friction to the user experience, we want it to be as minimal as possible," Frazier explains. While security experts have discovered flaws with SMS authentication, it's "better than nothing" if it's your only option, he continues.

Researchers asked participants which three online accounts they were most concerned with securing. Banking and financial accounts came out on top (85%), followed by communications and social media (32%), health (28%), retail (25%), and utilities (24%). Lack of concern for email accounts was "counterintuitive," they note in the report. In the absence of 2FA, email is usually the source of identity for financial accounts. If an attacker can successfully compromise an email account, they can likely change credentials for other accounts without raising red flags.

"If you're compromised once, you're compromised everywhere," Frazier points out.

Gaming Pays Off

A closer look at the demographic data shows younger users are at the forefront of 2FA adoption: 69% of users aged 18-24 use 2FA, as do 68% of those aged 25-34. The percentage drops for users among ages 35-44 (58%), 45-54 (49%), 55-64 (49%), and older than 65 (33%).

Part of the reason for this could be younger users' stronger familiarity with technology. As Frazier points out, gamers have been using 2FA for several years. As schools include tech and security in curricula, kids will continue to develop a greater understanding of basic security.

Frazier emphasizes the importance of encouraging awareness at the building block level with kids in schools, and continuing as they grow up and enter the workplace. "Apple, Google, and Microsoft have done a pretty good job of building this into their ecosystems," he continues. "As they are pervasive, it will make people intrinsically understand how these things work."

He anticipates by this time next year, consumers will report greater familiarity with, and adoption of, other authentication methods like security keys. In this year's survey, security keys were considered by those who used them to be efficient, secure, and easy to use.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Security 101: What Is a Man-in-the-Middle Attack?"

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems
Jai Vijayan, Contributing Writer,  2/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9024
PUBLISHED: 2020-02-17
Iteris Vantage Velocity Field Unit 2.3.1 and 2.4.2 devices have world-writable permissions for the /root/cleardata.pl (executed as root by crond) and /root/loadperl.sh (executed as root at boot time) scripts.
CVE-2020-9025
PUBLISHED: 2020-02-17
Iteris Vantage Velocity Field Unit 2.4.2 devices have multiple stored XSS issues in all parameters of the Start Data Viewer feature of the /cgi-bin/loaddata.py script.
CVE-2020-9026
PUBLISHED: 2020-02-17
ELTEX NTP-RG-1402G 1v10 3.25.3.32 devices allow OS command injection via the PING field of the resource ping.cmd. The NTP-2 device is also affected.
CVE-2020-9027
PUBLISHED: 2020-02-17
ELTEX NTP-RG-1402G 1v10 3.25.3.32 devices allow OS command injection via the TRACE field of the resource ping.cmd. The NTP-2 device is also affected.
CVE-2020-9028
PUBLISHED: 2020-02-17
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow stored XSS via the newUserName parameter on the "User Creation, Deletion and Password Maintenance" screen (when creating a new user).