You are a systems administrator recommending best practices for securing employee access to the company network. Why might using text messages for two-step verification be considered less secure compared to other methods?
Text messages are at risk of interception by attackers using techniques like SIM swapping.
Text message-based verification may not be compatible with devices that all users have.
The cost of sending text messages may present challenges for large organizations.
Text messages lack encryption, allowing them to be readable during transmission.