2FA with Google Authenticator Keeps Things Secure
January 16, 2019

2FA with Google Authenticator Keeps Things Secure

Leah Jakaitis | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Google Authenticator

Google Authenticator is used for 2FA (2-factor authentication). Google Authenticator displays a frequently-refreshing sequence of numbers that one inputs into the login interface on Gmail to gain access to one's account. It is used across the entire organization and integrates with the Google suite of services/products to keep access secure and limited to organization members. It provides a more reliable form of 2FA than SMS messaging (texts) or phone-call verifications.
  • Well-supported on mobile devices (Android, iPhone) with reliable app stability.
  • Integrates readily with Gmail and Google Suite.
  • Adds a complementary, supplementary layer of security to access (beyond password input).
  • Can be readily implemented to add 2FA for personal Google accounts.
  • Setup can be cumbersome for people without experience using 2FA methods.
  • Unable to access authenticator app if you don't have your mobile device available.
  • 2FA is a business necessity: it provides another layer of added security to digital resources and information.
  • Reliable security and access restrictions across the organization, and against outside influence/access
Other options exist for 2FA: IBM, ATT, RSA, Authy, and other hardware and software-based companies provide 2FA services to individuals and organizations. Google Authenticator was chosen for its ease-of-use, reliability, robust security, and accessibility to the entirety of the organization. It also worked seamlessly with the rest of the Google Suite and can be implemented on personal accounts.

Some kind of 2FA is almost always appropriate, but the specific instance may be more or less suited depending on particular security requirements. For instance, working with medical/health information may necessitate a far more stringent security process using other, industry-specific tools (including hardware authenticators). 2FA relies on two factors, rather than 2 inputs (like security questions), and therefore adds an additional layer of security over conventional passwords. 2FA may be overkill for personal accounts.