The username and password model is broken. Not because passwords are theoretically weak, but because the average person reuses passwords across dozens of accounts, and data breaches happen constantly — meaning credentials from a minor data breach ten years ago are actively being tested against major accounts today. Two-factor authentication is the primary defense that makes stolen passwords worthless.
But 2FA isn't uniform. There's a significant security gap between the most common implementation (SMS codes) and the better alternatives. Understanding that gap is worth the five minutes it takes.
Why 2FA Has Become Non-Negotiable
A compromised password used to mean a compromised account. With 2FA, an attacker who has your password still can't log in without the second factor — something only you possess, like your phone or a hardware key. This single addition makes credential-stuffing attacks (automated login attempts using breached passwords) nearly ineffective and dramatically raises the effort required for targeted attacks.
The question isn't whether to use 2FA. It's which type to use, and which accounts to prioritize.
The Problem With SMS 2FA
SMS (text message) 2FA is better than no 2FA. But it has a well-documented vulnerability called SIM swapping. An attacker who targets you specifically can call your mobile carrier, impersonate you using personal information gathered from social media and data brokers, and convince the carrier to transfer your phone number to a SIM card they control. At that point, they receive all your SMS codes and can reset any account tied to your number.
SIM swapping attacks have successfully compromised cryptocurrency accounts, social media accounts, and even email accounts of high-profile individuals. It requires motivated, targeted effort — so for most people, SMS 2FA is still adequate. But for your most critical accounts (email, banking, cryptocurrency), use a stronger method.
SMS 2FA is substantially better than nothing and stops the vast majority of automated attacks. The SIM swap vulnerability is a targeted attack that requires attacker effort. Don't avoid SMS 2FA entirely — it's still a meaningful improvement. Just prefer authenticator apps where the option exists.
The Better Method: TOTP Authenticator Apps
TOTP (Time-based One-Time Password) authenticator apps generate a 6-digit code on your phone that refreshes every 30 seconds. These codes are generated locally using a secret key stored on your device — they don't go through your mobile carrier's network, so SIM swapping doesn't affect them.
Recommended authenticator apps:
- Authy — The most beginner-friendly option. Includes encrypted cloud backup of your 2FA accounts, which is critical — if you lose your phone without backup, you lose access to your accounts.
- Google Authenticator — Simple, widely supported, now includes Google Account backup. The trade-off is that backup requires a Google account.
- Microsoft Authenticator — Works seamlessly with Microsoft accounts and supports most TOTP sites. Includes backup and has a push-notification option for Microsoft services.
- Bitwarden Authenticator — Good option if you're already using Bitwarden as a password manager, as it integrates directly.
How to Set Up an Authenticator App (Step by Step)
Using Google as an example:
- Go to myaccount.google.com → Security → 2-Step Verification
- Click Get started and verify your identity
- Scroll down to Authenticator app and click Set up
- Open your authenticator app and scan the QR code displayed on screen
- Enter the 6-digit code shown in your app to verify the setup
- Save your backup codes (discussed below)
Most major services follow this same pattern: find 2FA or two-step verification in security settings, choose authenticator app, scan QR code, verify with a code. The setup takes about 90 seconds per account.
Hardware Security Keys: The Gold Standard
For maximum security — particularly for email and any financial accounts — hardware security keys (like YubiKey or Google's Titan Key) are the strongest form of 2FA available. They're physical USB or NFC devices you plug in or tap against your phone. Phishing attacks cannot intercept them even if you're on a perfect replica of a login page, because the key verifies the actual domain cryptographically.
YubiKey 5 Series (~$50) handles most usage needs. For most individuals, this is overkill — but if you're a journalist, executive, activist, or anyone with a meaningfully elevated threat profile, hardware keys are worth the investment.
Which Accounts to Set Up First
Not every account needs 2FA immediately. Prioritize in this order:
- Email — This is the master key. Whoever controls your email can reset every other account's password.
- Banking and financial services — Direct financial risk.
- Primary social media — Account hijacking is used to defraud your contacts.
- Password manager — If you use one, protect it first along with email.
- Work accounts — Compromising work credentials often has downstream victim effects beyond yourself.
Always Set Up Backup Codes
Every service that offers 2FA also provides backup codes — one-time codes you can use to access your account if you lose your phone or authenticator app. Save these codes somewhere physical and secure — print them and store with important documents, or write them in a secure location. Do not save them only on the device you're protecting with 2FA.
Losing access to your authenticator without backup codes means going through a time-consuming account recovery process — if the service even offers one. Set up backup codes the moment you enable 2FA on each account; ten minutes now prevents a potentially irreversible lockout later.
Enable 2FA on your email account in the next 10 minutes. It's the single most impactful security action available to the average internet user. Use an authenticator app rather than SMS if the service supports it. Set up your backup codes. Done — your account security just leaped significantly ahead of the average.