Skip to main content
Knowledge + Passion + Innovation

What Is “Porting?” A New Way For Thieves To Commit Identity Theft And Circumvent Two-Factor Authentication.

Learning Center
Business meeting with two professionals shaking hands at a table with documents and laptops.
Get Help Now
Experience the Difference with Our Legal Team

What Is Porting?

Porting allows you to transfer your current mobile number over to a new carrier. It’s helpful because it frees you from having to inform all of your current contacts about your new phone number, which, depending on how many contacts you have, can be a tedious and time-consuming process.  

Circumventing 2FA

Unfortunately, porting does introduce a vulnerability in your information security. Scammers have figured out how to request phony port-outs, which, if successful, allows them to circumvent two-factor authentication (2FA) protection. If a thief tries to sign in to your account and you have a certain form of 2FA enabled, a text is sent to your phone with a code required to complete the sign-in. A phony-port out of your number allows a thief to interrupt those text messages, thus granting them the 2FA code and access to your information.  

This type of theft is referred to as a “cross-account take over scheme” because it allows the thief to gain access to numerous accounts with very basic information (e.g. email address, or financial account ID).  

Various carriers have established their own forms of request validation to help prevent this practice and we recommend you ask your provider how they manage this risk. Also, there are third-party authenticator applications such as Google Authenticator which generate unique codes each time you sign into your accounts. Since they are apps, they live on your phone and the unique codes are not sent via SMS.  

We Are Here To Help

Starting or running a small business comes with a lot of important decisions, many with serious legal ramifications. Our Cybersecurity attorneys are here to answer your questions and help you navigate the legal side of owning a business. Whether you’re just getting started or need guidance on business structure, contracts, or compliance, we’re ready to support you. Call us today or fill out a quick form to schedule a consultation and take the next step with confidence.


Visit these links for related information

What is Synthetic Identity Theft?
“Typosquatting” Makes Typos Matter

A smiling man in a suit and tie against a plain background.

Written By Kellam T. Parks

Attorney, Managing Member

Kellam founded what is now Parks Zeigler, PLLC in 2012 to embrace modern technologies to best serve clients. This passion for technology led to the formation of the Cybersecurity/Data Privacy practice area making the firm a leader in helping businesses protect themselves and respond to incidents. When he’s not practicing law in this area and handling high-asset divorces, Kellam manages the firm with his co-owner, Brandon Zeigler, contributes to local and state-wide Bar associations, and frequently writes and speaks to audiences across a variety of sectors and geographic locations, including nationally on the topics of Cybersecurity/Data Privacy, digital evidence, law firm management, and technology/AI.

Recent Resource Articles

Our team shares their wealth of knowledge through our free blog.
    Handshake at a meeting table with notebook and documents, symbolizing business agreement or partnership.

    Experience the Parks Zeigler, PLLC Difference

    We combine experience, technology, and teamwork to maximize your legal results.