1. Knowledge Base
  2. 5 Factor Authentication

What about alternative 2FA methods of security, like text messages, usb authenticators, or OTP cards?

Most common methods of 2FA are vulnerable to cyber attacks (ex: sim-swapping, phishing email forms, etc.) or require users to remember to keep with them at all times an unwieldy or easily misplaced security device. With Token, you wear it all day and don't have to think about it.