DATA DOCTORS

What exactly is two-factor authentication and how do I use it?

Aug 12, 2014, 11:16 PM | Updated: 11:16 pm

What exactly is two-factor authentication and how do I use it?

In my previous post, I outlined the steps everyone should take to protect themselves from password thieves that included using two-factor authentication.

It should be fairly evident that Internet security breaches are a fact of digital life, so we all need to have a different mindset when it comes to our passwords: They are going to be compromised.

Anyone that uses a credit card has experienced fraud alerts and the process of getting a replacement card when a fraudulent transaction has been made. It’s not uncommon to have to replace your credit card once or twice a year these days, but we take it in stride and move on.

If you assume (and you should) that your passwords are going to be compromised, take some steps to protect yourself so you’ll know what to do when it happens.

Just as you have fraud alerts setup for your credit cards and bank accounts, you can do the same with just about every online service you use by activating two-factor authentication.

Think of it as a double lock combined with an alert system when someone attempts to use your passwords.

The two factors are something you know (your username and password) and something you have (your phone) to prove that you are the rightful owner of an account.

Some online services refer to it as two-step verification or multiple-step validation, but regardless of what they call it, they generally work the same way.

To activate the feature, you enter the phone number of the device you want security codes sent to when logging in from unknown devices.

Once that’s in place, the first time you log into the account from your computer, smartphone or tablet, you will be asked for a special code that gets sent to your phone as a text message.

When you’re using devices you own, you can tell the site to remember so you don’t have to go through the two-step validation every time. If you use more than one browser on your computer, you’ll need to go through the process with each browser. If you delete your cookies, you’ll be asked to type in the special code again.

Once it’s setup, even if a hacker acquires your username and password, they won’t be able to access your account because they don’t have your phone in their hand.

The best part of using two-factor authentication is that it automatically becomes a fraud alert system when someone has your username and password.

For example, if you get a text message out of the blue saying here’s your access code, you’ll know that someone has acquired your username and password and is trying to use them.

You’ll also know that they can’t get in without your phone, so you can simply change your password when you get home to prevent future issues.

Just about every major online e-mail service, social network, financial institution and retailer has begun to offer two-factor authentication as a feature, but it’s up to you to set it up.

The exact steps for setting up each account will differ, so I’ve posted the links to directions for the most popular services.

If you’re looking for directions for a site that’s not on the list, let me know!

Data Doctors

Patrick Mahomes #15 and head coach Andy Reid of the Kansas City Chiefs are recorded on a phone as t...

Data Doctors

Handy tech tips all Valley residents should use to find lost phones in a snap

Q: My phone went missing, and I haven’t been able to locate it using the Find My service, so what should I do next?

5 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are tips for freeing up Google storage space

Google provides a generous amount of free online storage but it can fill up quickly depending on how many of its resources you use.

12 days ago

Discover how to assess, estimate, and shop for the right battery pack with this concise guide. (Pex...

Data Doctors

Here is everything you need to know for testing and buying battery banks

Discover how to assess, estimate and shop for the right battery pack with this concise guide.

19 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are the truly free smartphone video editing apps

The processing power on our smartphones has grown exponentially, allowing anyone to perform sophisticated video editing easily.

26 days ago

Google Maps app....

Data Doctors

How to rediscover places visited years ago on Google maps

Whether you're an Android or iOS user, or prefer accessing Google Maps on your computer, you'll find step-by-step instructions to unlock your travel memories effortlessly.

1 month ago

(Photo by Michael Bocchieri/Getty Images)...

Ken Colburn, Data Doctors

Here’s how to calculate your bandwidth needs

When searching for an alternative internet service provider, here are some tips on how to know how much bandwidth is needed.

1 month ago

Sponsored Articles

...

Midwestern University

Midwestern University Clinics: transforming health care in the valley

Midwestern University, long a fixture of comprehensive health care education in the West Valley, is also a recognized leader in community health care.

...

Collins Comfort Masters

Here’s 1 way to ensure your family is drinking safe water

Water is maybe one of the most important resources in our lives, and especially if you have kids, you want them to have access to safe water.

(KTAR News Graphic)...

Boys & Girls Clubs

KTAR launches online holiday auction benefitting Boys & Girls Clubs of the Valley

KTAR is teaming up with The Boys & Girls Clubs of the Valley for a holiday auction benefitting thousands of Valley kids.

What exactly is two-factor authentication and how do I use it?