We use passwords on a day-to-day basis, from checking the bank to logging onto Twitter, but they can be the weakest link in the chain of security around these use cases. If they are simple, they can be cracked; and if they are complex, they are more likely to be reused so if one is cracked or lost, all of them are. Using Two-Factor Authentication
Go to Source
Author: Nathan Ord