How To Maximize Security With Two Factor Authentication
The need for security online has never been greater. As hackers become ever more complex in their means of accessing personal information, the need to tighten up the security around our online lives grows. Two factor authentication has become a popular method of thwarting attackers and creating peace of mind when dealing with data security.
One need only look at Ashley Madison, the adulterous dating site to see how there are malign forces out there who just want to see the world burn. In the Ashley Madison case setting the world on fire involved releasing identifiable information such as email addresses and account details of some 32 million users. Also see Yahoo, whose latest in a long string of hacks in February 2017 failed to even make top news.
Unfortunately, oftentimes the simplest of attacks works. The tactic of sending phishing emails to celebrities and politicians asking them to confirm their passwords is jaw dropping in its simplicity. This happened to Clinton’s presidential campaign, and it also happened to female celebrities in the massive 2014 iCloud leak.
Two Factor Authentication
Two factor authentication (2FA) is something that is ingrained in our everyday lives, but many don’t notice. 2FA is the need to have two points of identity verification before proceeding to confidential material. Whenever you buy anything in a shop it is likely you use it. The chip and pin system is probably the most ubiquitous and best known form of 2FA. To proceed with a purchase or to look at confidential bank details, the buyer needs to be able to provide the physical card with a chip in it, as well as the four digit pin that has been committed to muscle memory after thousands of uses over the years.
The Need for 2FA
As shown by the hack of a presidential candidate — around whom you would expect security to be pretty tight — with such unsophisticated methods, we are all at risk. 2FA offers that next level of security without having to remember too much information or being hassled upon login.
2FA is practiced by many of the larger tech companies such as Google, Apple, Twitter, Facebook and Amazon. You’ll have noticed recently that Facebook is keen to get hold of your phone number. This is used if there is a suspicious login attempt, Facebook can use your proximity and access to your mobile as a means of secondary identification. Gmail asks for a backup email or a mobile number to carry out exactly the same types of check.
Apple, quite possibly in response to the iCloud hack, has enabled 2FA on their cloud storage service. This means that whenever a login is attempted on an unknown device, a code is sent to a secondary iPhone or Mac in an attempt to guarantee the identity of the person trying to log in.
Originally published at blog.100tb.com.