Multi-Factor Authentication: Not All MFA Is Created Equal
SMS codes are better than nothing, but they’re not secure. Understand the different MFA methods and which ones actually protect against attacks.
If you’re reading this in 2026, you’ve probably been told to "enable MFA" hundreds of times. Maybe you already have it turned on for your important accounts.
But here’s what nobody tells you: not all MFA is created equal.
Some MFA methods barely improve security. Others make accounts virtually unbreakable. Understanding the difference could save your organization from a security incident.
What Is Multi-Factor Authentication?
MFA requires users to prove their identity using multiple factors:
- Something you know — Password, PIN
- Something you have — Phone, security key, smart card
- Something you are — Fingerprint, face recognition, iris scan
The idea: Even if attackers steal your password, they can’t access your account without the second factor.
In practice, some MFA methods are far stronger than others.
MFA Methods Compared: At a Glance
| Feature | Hardware Keys | Passkeys | Authenticator Apps | Push Notifications | SMS Codes |
|---|---|---|---|---|---|
| Phishing Resistant | ✓ | ✓ | — | — | — |
| Works Offline | ✓ | ✓ | ✓ | — | — |
| No User Code Entry | ✓ | ✓ | — | ✓ | — |
| Requires Hardware | $20-50 | None | None | None | None |
| Setup Complexity | Low | Low | Low | Low | Very Low |
| Security Rating | Excellent | Excellent | Good | Good | Weak |
Our Top Recommendations
Detailed Analysis: Pros & Cons of Each Method
🔵 Hardware Security Keys (The Gold Standard)
How it works: Physical tokens (YubiKeys, Titan Keys) that prove identity through cryptographic challenge-response. Users plug in or tap the key to authenticate.
Why it’s the best:
- ✅ Phishing-resistant through domain binding
- ✅ No man-in-the-middle attacks possible
- ✅ Works offline—no network needed
- ✅ Simple user experience—just tap or plug in
- ✅ Immune to SIM swapping and SMS interception
Considerations:
- ⚠️ Costs $20-50 per key
- ⚠️ Can be lost or damaged (register 2 keys per user)
- ⚠️ Requires USB/NFC support on devices
Our Verdict
🔵 Passkeys (FIDO2/WebAuthn) (The Future)
How it works: Device-based cryptographic authentication that works like hardware keys but syncs across your devices via iCloud, Google, or password managers.
Why it’s transformative:
- ✅ All security benefits of hardware keys
- ✅ Syncs across devices via iCloud/Google/password managers
- ✅ No single point of failure
- ✅ No passwords or codes to remember
- ✅ Backed by Apple, Google, Microsoft
Current limitation:
- ⚠️ Not all services support it yet (but adoption growing rapidly)
- ⚠️ Requires understanding of which devices have access
Our Verdict
🟢 Authenticator Apps (TOTP)
How it works: Apps like Google Authenticator, Microsoft Authenticator, or Authy generate time-based codes on your device.
Why it’s better:
- ✅ No SMS interception risk
- ✅ Works offline
- ✅ Not vulnerable to SIM swapping
- ✅ Easy to set up
- ✅ Free solutions available
Remaining weaknesses:
- ⚠️ Can still be phished in real-time attacks
- ⚠️ Users can be socially engineered into sharing codes
- ⚠️ Device loss means lockout without backup codes
Our Verdict
🟢 Push Notifications
How it works: Apps like Microsoft Authenticator or Duo send push notifications asking you to approve login attempts.
Why it’s better:
- ✅ No codes to type—very user-friendly
- ✅ Shows login location and device information
- ✅ Can't be phished through fake websites
Remaining weaknesses:
- ⚠️ MFA fatigue attacks—spam until users approve accidentally
- ⚠️ Users may approve without reading details
- ⚠️ Requires network connection
- ⚠️ Enable number matching to prevent fatigue attacks
Our Verdict
🔴 SMS Codes (Least Secure)
How it works: You receive a 6-digit code via text message and enter it to prove identity.
Why it’s weak:
- ❌ SIM swapping attacks
- ❌ SS7 vulnerability allows SMS interception
- ❌ Compatible with real-time phishing
- ❌ No cell signal = no access
- ❌ Avoid for privileged accounts
Minimal benefits:
- ⚠️ Better than password-only
- ⚠️ Familiar to most users
- ⚠️ No app installation required
Our Verdict
What About Biometrics?
Fingerprints, face recognition, and other biometrics are local authentication methods. They unlock your device, which then uses one of the above methods to authenticate to services.
For example:
- Face ID unlocks your iPhone
- iPhone uses a passkey to authenticate to your Google account
Info
Real-World Attack: ShinyHunters SSO Campaign (January 2026)
Recent news highlights why MFA method matters:
The ShinyHunters extortion gang launched sophisticated voice phishing attacks targeting SSO accounts at Okta, Microsoft, and Google. Their goal: bypass MFA and compromise corporate SaaS platforms.
How they did it:
- Phished user credentials through fake login pages
- Called victims pretending to be IT support
- Convinced users to approve MFA push notifications
- Gained access to corporate applications
Which MFA Would Have Stopped This?
- ❌ SMS codes — Could have been requested and shared
- ❌ Push notifications — Were socially engineered
- ✅ Hardware security keys — Impossible to phish through fake websites
- ✅ Passkeys — Cryptographically tied to real domain
Choosing the Right MFA for Your Organization
For Administrator Accounts
For General Users
For High-Risk Industries
Avoid
Implementation Tips
- Require MFA for everyone — No exceptions, no matter how senior
- Disable SMS fallback for admins — Remove the weakest link
- Distribute backup keys — Give admins a second hardware key to store securely
- Enable conditional access — Require stronger MFA for sensitive actions
- Monitor for MFA bypass attempts — Alert on failed MFA attempts or push spam
The Bottom Line
MFA is essential, but the method matters. SMS codes are better than nothing. Authenticator apps are good. Hardware keys and passkeys are best.
Choose MFA methods based on risk, not convenience. Your administrator accounts deserve the strongest protection available.
Need help implementing strong MFA?
OSA configures phishing-resistant authentication across identity platforms like JumpCloud, Microsoft Entra ID, and Okta.
Let’s secure your accounts