DATA DOCTORS

Benefits and concerns with using 3rd-party authentication apps

Feb 25, 2023, 6:30 AM
(Pexels Photo)...
(Pexels Photo)
(Pexels Photo)

Q: What are the pros and cons of using a third-party authentication app?

A: Every user of the internet should be familiar with the security concept known as ‘2-factor authentication’ (2FA) which typically uses your smartphone to verify that you are the owner of an account while logging in via a special one-time code.

It’s the best thing you can use to help protect against the many threats of having your accounts compromised, even if you fall for a sophisticated phishing scam.

Most every account you have has the option to set up 2FA, so if you haven’t done so, I’d highly recommend you do it immediately.

Third-party authentication apps

An alternative to setting up the text messaging-based authentication that most companies like Facebook and Twitter use, is by installing an app that provides the authentication codes.

This outside option for securing your accounts has many pros and cons, so depending upon the services you want to protect and your comfort with learning new apps, this may or may not be your best option.

Pros of using an app

One of the downsides to using the standard text-messaging process to receive your verification codes is that if you don’t have a cell signal, you might not get your code delivered to your smartphone.

A common example of this is if you’re on a long flight using the airplane’s Wi-Fi service. You have internet access, but you won’t have cell service which is how your verification code may be sent.

Third-party authentication apps generate the code on your smartphone, so they can still work if your smartphone can’t get a cell signal.

An authentication app will also protect against a technique hackers use to compromise text-based 2FA codes by using SIMjacking.

They pose as you with your mobile carrier and convince them to transfer your number to a new SIM as if you had just purchased a new phone so they can get your texted codes.

In many cases, the encryption protocols used by authentication apps are also much stronger than text messaging codes.

Compatibility with most major services also allows you to secure all your accounts with one app.

Cons of using an app

As with any technology, there can be challenges if you decide to switch to an authentication app since your ability to access your accounts is now tied to a specific device.

If you use an app on your smartphone for authentication and the battery goes dead or the device breaks or gets stolen, you could get locked out of your accounts.

Ensuring that you have the app set up on multiple devices like a smartphone and a tablet can help reduce your risk of being locked out.

Some non-technical users may find using the app to be too complex or confusing to set up and use, which is why I recommend that you always test the app with a single non-essential account before you decide to convert all your accounts.

Some online accounts, especially financial services, may not be compatible with a third-party authentication app, so you’ll have to spend time learning what will and won’t work.

Data Doctors

(Pexels Photo)...
Data Doctors

Here’s what we know about Facebook’s potential new monthly charge

It was easy to tell anyone that anything claiming Facebook would start charging users was a hoax, but all that changed last month.
5 days ago
(Photo by Phil Barker/Future Publishing via Getty Images)...
Data Doctors

A brief explainer on signs your computer could be infected

If you own a computer, here's a list of signs that could help you determine if your device has been infected.
12 days ago
(Pexels Photo)...
Data Doctors

Understanding email subscription notifications spamming

What you experience is "subscription bombing" used for reasons that can range from being a nuisance to distracting you from other activities.
19 days ago
(Mesa Police Department Photo)...
KTAR.com

Mesa police seeking 27-year-old woman wanted in murder case

Mesa police are searching for a 27-year-old woman wanted in a murder case after a man was found dead inside a bedroom in early February.
23 days ago
(Photo by Phil Barker/Future Publishing via Getty Images)...
Data Doctors

What to know when buying a processor for a new computer

If you use your computer for complex tasks such as gaming, editing or programming, you’ll need to pay attention to the processor you buy.
1 month ago
(Pexels Photo)...
Data Doctors

Why scammers love using gift cards to steal money

The use of gift cards is a favorite vehicle by scammers to extract money from victims for a variety of reasons.
1 month ago

Sponsored Articles

(Photo: OCD & Anxiety Treatment Center)...

Here’s what you need to know about OCD and where to find help

It's fair to say that most people know what obsessive-compulsive spectrum disorders generally are, but there's a lot more information than meets the eye about a mental health diagnosis that affects about one in every 100 adults in the United States.
(Photo by Michael Matthey/picture alliance via Getty Images)...
Cox Communications

Valley Boys & Girls Club uses esports to help kids make healthy choices

KTAR’s Community Spotlight focuses on the Boys & Girls Club of the Valley and the work to incorporate esports into children's lives.
...
Day & Night Air Conditioning, Heating and Plumbing

Prep the plumbing in your home just in time for the holidays

With the holidays approaching, it's important to know when your home is in need of heating and plumbing updates before more guests start to come around.
Benefits and concerns with using 3rd-party authentication apps