phishing emails and data breaches the computing world has made it difficult to
recognize legitimate emails vs phishing emails. Having MFA, it provides the
user a second layer against illegal access. The intruder will not need only the
user name password but now they need to MFA access code. Only the user
registered to a trusted device can access their data.