Why should you activate two factor authentication…now!
What is Two Factor Authentication?
Two-factor authentication (also called 2FA, multiple-factor or multiple-step verification) is a tool to double check that your identity is legitimate.
Why use Two Factor Authentication?
If there’s one account that’s worth protecting above all others, it’s your email. Not only because it contains your private conversations and data, but because it serves as a gateway to your other online accounts and other users. Two-factor authentication has long been used by the business world to control access to sensitive systems and data – but now with increased levels of phishing and scammers trying to gain access to customer accounts, two factor authentication is becoming essential even on the most basic personal accounts.
If you already follow basic password security measures, two-factor authentication will make it more difficult for cyber criminals to breach your account. For example, cyber attackers have the power to test billions of passwords combinations in a second, and many users mistakenly use the same password on every account (that’s just like using the same keys to unlock your house, car and safe). Two-factor authentication really just provides an additional layer of security and makes it harder for attackers to gain access to a person's devices, mail and online accounts - because knowing one password alone is not enough to pass authentication and their chances of success are drastically reduced.
How it Works.
Two Factor authentication a combination of any two of the three ways listed below. When this is applied it is usually made from points 1 and 2 (point 3 is very expensive and very complicated). Two Factor is made up of something that a user knows and something the user owns. The device that they own then provides a solution where a Passcode is generated locally or is received by SMS, Voice or a Secure Email.
1. Something the user knows (PIN, Password, Secret)
2. Something the user owns (Mobile Phone, Device)
3. Something the user is (Biometric, retina, fingerprint)
How to Install