DATA DOCTORS

Benefits and concerns with using 3rd-party authentication apps

Feb 25, 2023, 6:30 AM

(Pexels Photo)...

(Pexels Photo)

(Pexels Photo)

Q: What are the pros and cons of using a third-party authentication app?

A: Every user of the internet should be familiar with the security concept known as ‘2-factor authentication’ (2FA) which typically uses your smartphone to verify that you are the owner of an account while logging in via a special one-time code.

It’s the best thing you can use to help protect against the many threats of having your accounts compromised, even if you fall for a sophisticated phishing scam.

Most every account you have has the option to set up 2FA, so if you haven’t done so, I’d highly recommend you do it immediately.

Third-party authentication apps

An alternative to setting up the text messaging-based authentication that most companies like Facebook and Twitter use, is by installing an app that provides the authentication codes.

This outside option for securing your accounts has many pros and cons, so depending upon the services you want to protect and your comfort with learning new apps, this may or may not be your best option.

Pros of using an app

One of the downsides to using the standard text-messaging process to receive your verification codes is that if you don’t have a cell signal, you might not get your code delivered to your smartphone.

A common example of this is if you’re on a long flight using the airplane’s Wi-Fi service. You have internet access, but you won’t have cell service which is how your verification code may be sent.

Third-party authentication apps generate the code on your smartphone, so they can still work if your smartphone can’t get a cell signal.

An authentication app will also protect against a technique hackers use to compromise text-based 2FA codes by using SIMjacking.

They pose as you with your mobile carrier and convince them to transfer your number to a new SIM as if you had just purchased a new phone so they can get your texted codes.

In many cases, the encryption protocols used by authentication apps are also much stronger than text messaging codes.

Compatibility with most major services also allows you to secure all your accounts with one app.

Cons of using an app

As with any technology, there can be challenges if you decide to switch to an authentication app since your ability to access your accounts is now tied to a specific device.

If you use an app on your smartphone for authentication and the battery goes dead or the device breaks or gets stolen, you could get locked out of your accounts.

Ensuring that you have the app set up on multiple devices like a smartphone and a tablet can help reduce your risk of being locked out.

Some non-technical users may find using the app to be too complex or confusing to set up and use, which is why I recommend that you always test the app with a single non-essential account before you decide to convert all your accounts.

Some online accounts, especially financial services, may not be compatible with a third-party authentication app, so you’ll have to spend time learning what will and won’t work.

Data Doctors

Which backup option is better: cloud storage or cloud backup?...

Data Doctors

How to compare and contrast cloud storage and cloud backup

So you're considering both cloud storage and cloud backup. Not sure which backup option is better for you? This guide can help.

2 days ago

If you’re on your computer all day long, you’ll wonder how you ever lived without it once you s...

Ken Colburn, Data Doctors

Here are some benefits of having dual displays

If you’re on your computer all day long, you’ll wonder how you ever lived without it once you start having dual displays.

9 days ago

A person holding up their smartphone....

Ken Colburn, Data Doctors

Here are the tips on how to enable crash detection on mobile devices

Various mobile devices have different ways to enable crash detection and here are the tips to enable them on certain devices.

16 days ago

Various versions of Windows include the option to use BitLocker, which is Microsoft’s built-in en...

Ken Colburn, Data Doctors

Here are the pros and cons of using Windows BitLocker

Various versions of Windows include the option to use BitLocker, which is Microsoft’s built-in encryption tool. Here are pros and cons.

23 days ago

College students will be fully responsible for managing their devices independently and preparing t...

Ken Colburn, Data Doctors

Here are cybersecurity tips for college students

College students will be fully responsible for managing their devices independently and preparing them for the most common dangers is important.

30 days ago

...

Sponsored Content by Day & Night Air Conditioning, Heating and Plumbing

It wouldn't hurt to get your AC checked after Arizona’s excruciating heat wave

A well-maintained air conditioning unit is vital to living a comfortable life inside, away from triple-digit heat in Arizona.

Sponsored Articles

...

Sanderson Ford

3 new rides for 3 new road trips in Arizona

It's time for the Sanderson Ford Memorial Day sale with the Mighty Fine 69 Anniversary, as Sanderson Ford turned 69 years old in May.

...

DESERT INSTITUTE FOR SPINE CARE

Desert Institute for Spine Care is the place for weekend warriors to fix their back pain

Spring has sprung and nothing is better than March in Arizona. The temperatures are perfect and with the beautiful weather, Arizona has become a hotbed for hikers, runners, golfers, pickleball players and all types of weekend warriors.

...

COLLINS COMFORT MASTERS

Here are 5 things Arizona residents need to know about their HVAC system

It's warming back up in the Valley, which means it's time to think about your air conditioning system's preparedness for summer.

Benefits and concerns with using 3rd-party authentication apps