<razzy>
either in work or at home. cess11 how problematic it is to use. how it increase safety.
<cess11>
depends entirely on the implementation
<cess11>
at work we have it on one support ticket service, it's with email so the weak point is probably with social engineering of either my employer or the account retrieval process with microsoft
<razzy>
cess11: well, do you have recomendation for product?
<cess11>
use a hardware key
<cess11>
if the organisation isn't already on password managers and long random passwords, start there
<cess11>
it's the weakest link that will break, if some doofus has summer2020 as email password it doesn't matter that the email is used for 2fa
<cess11>
if the organisation switches some important password for everyone every six weeks that's what will break, because it takes a fake package delivery and a recording device to catch some post-it