Updated January 13, 2023
Reading Time: 2 minutesSimple Setting for Improved Online Security
Online security is under attack everywhere you turn. But did you know that there is a simple setting within many online applications to make it more secure without costing you a penny? In this post I’ll explain the two-step verification process and the online applications and accounts where this simple setting is available.
What is Two-Step Verification?
Two-step verification is also known as two-step authentication. Basically it means that an authorized user must enter a security code in addition to their password when logging into an account. Usually the security code is randomized — system generated and changed frequently — and is sent to a mobile device. So if an authorized person (or program like brute force software) gets a hold of your user/login name and password, they still can’t get into your account. While nothing is foolproof, two-step verification is an added defense for online security.
Applications With 2-Step Online Security Available
1. WordPress
We’ve been using WordPress’ 2-step authentication process for several months. Due the SEO visibility of our website and blog, hackers like to target us. We like this feature so much we recommend it to our clients along with strong passwords. Our rule of thumb? If you can remember the password, it’s not robust enough.
2. Twitter, Facebook, LinkedIn
Twitter got a black eye earlier this year when they got hacked (250,000 users were affected). As a result, they instituted better online security with two-step authentication. You’ll need to confirm your email address and add a phone number to your account.
3. Google Accounts & Apps
While we love Google, the process is a bit complicated. We suggest that you review (and understand) their support documentation.
Just Do It
Probably the biggest hurdle of implementing the two-step process is the hassle factor. Until your account gets hacked, that is. To quote Nike… just do it.
If you’re a Mac or Evernote user, check out Mashable’s 10 Simple Security Settings for more info. I also suggest that you keep in mind control of your data. Online security also means understanding who has access to what.
Have you implemented 2-step verification for your online security? If so, how easy was it to implement and maintain?