October 6, 2015 by

It’s #2FactorTuesday. It’s Time to Embrace Security

If you haven’t already enabled two-factor or two-step verification on your multitude of social, personal and business accounts in cyberspace, you’re doing it wrong.

Headlines are made every day of data breaches, embarrassing incidents hacked accounts in social media, identity theft and other incidents. It’s only prudent that you enable better security for your accounts, by adding another step to it.

Two-step or two-factor authentication is better than a password. While it isn’t perfect, it brings added security to your accounts, by adding a layer of security beyond your password.

Quite simply, two-step verification requires you to provide an additional code as a means to verify your credentials before logging into your account.

Here’s how it works:

  • To set up two-factor authentication, you’ll have to set up a phone number or an alternative email on your account that provides the security feature.
  • After entering your password as you would routinely, you will be sent a text message that’s usually timed to expire within a short period. It’s also disposable and can only be used once.
  • When you enter the code after your username and password, you will gain access to your two-factor security-enabled account.

The security feature is already offered and implemented by companies in the mainstream.

Here are a few popular online platforms that offer the feature, along with instructions:

 

About the author

Image of Author

LIFARS is the global leader in Digital Forensics and Cyber Resiliency Services. Our experience spans two decades working on high profile events, often in concert with Law Enforcement Agencies around the world. Our proprietary methodology derives directly and indirectly from our experience working with and for U.S. Intelligence Agencies, Interpol, Europol, and NATO. We are solely dedicated to Cyber Resiliency and thus pay close attention to all aspects of our clients’ engagements experience while providing a strategic and integrated array of services to minimum risk and disruption while protecting your brand.

Related articles

Former Rutgers Student Pleads Guilty to Creating Mirai Botnet

A former Rutgers university student is among three men who pleaded guilty to creating the dreaded...

Read more arrow_forward

Hackers Invade Safety System of Critical Infrastructure Facility

Hackers, presumed to work for a nation-state, recently hacked a safety system belonging to a...

Read more arrow_forward

New Ransomware ‘Spider’ Threatens Wipeout in 96 Hours

A new strain of ransomware discovered by security researchers encrypts files and gives victims a...

Read more arrow_forward