In 2013, there was a new identity fraud victim every two seconds according to a study conducted by Javelin Strategy and Research. While data breaches accounted for about a third of the fraud, account takeovers made up more than a quarter of the results. One way to help improve your chances in fighting these staggering statistics is to use two-step verification to secure accounts.
Two-step verification relies on trusted devices
Two-step-verification, or two-factor authentication, is becoming an increasingly popular security tool. The process is popular with services that use it because it adds a second layer of security on top of the traditional user name and password. The second step is secure because it relies on a physical device in your possession, which is typically a phone. When the service needs to verify you’re really the one logging in, they send a message to your registered device.
How to use two-step verification
Google’s two-step verification process relies on a system of trusted devices. It is an example of how the process can be easy to use while increasing account security. In order to use Google’s two-step verification, you need to register a phone number that can receive text messages from Google. Once your phone is registered, it becomes your second step in the two-step verification process. The first time you log in from a new device, a verification code is sent to the registered phone number. Enter the verification code on the new device, and it becomes a trusted device.
The process for using two-step verification is different for each service. Here are links to the major services using two-step verification. Email Providers: Google, Microsoft Outlook, Yahoo!. Social Networks: Facebook, HootSuite, LinkedIn, Tumblr, Twitter.
Find more information about two-step verification on the Stop. Think. Connect. website.
Recent Comments