Geeks2U Promise
We guarantee you'll love our fast, friendly service - or we'll refund your money.  
133,572 Happy Customers & Counting
Need tech support?
1300 769 448
Extended hours, 7 days a week
Home  /  geekspeak  /  Play it safe with two-factor authentication

Play it safe with two-factor authentication

Tags : 

two-factor-lge

Using your phone to prove who you are adds an extra layer of protection to your online accounts.

The recent high profile attack on US technology journalist Mat Honan proves that strong passwords alone are not enough to protect you against malicious hackers. After gleaning information from various sources, a hacker tricked Apple’s tech support into granting them access to Honan’s iCloud account. From here the hacker wiped Honan’s iPhone, iPad and MacBook, erased their online backups, deleted Honan’s Google account and took control of his Twitter feed.

Honan was the victim of an elaborate social engineering scam but it’s not that hard for hackers to learn enough about you to impersonate you. The concept of “two-factor” authentication makes it harder for hackers to breach your defences by requiring them to present two forms of identification. Two-factor identification tends to involve something you know, such as a password, and something you have. The something you have might be your fingerprint, a USB stick or a keyring token displaying an ever-changing code. But it can also be a one-time code sent to your mobile phone.

Both Google and Facebook offer the option to enable two-factor authentication to guard against unauthorised access to your accounts. Once activated it texts a one-off code to your mobile phone whenever you try to login from a new computer for the first time. With two-factor authentication enabled, you’re required to enter both your password and the code sent to your phone. Once you’ve logged in you’ve the option to set that computer as a “trusted device” so you’re not continually forced to enter an SMS code when logging in from your own computer.

While two-factor authentication can foil hackers, there are times when it can also make your life more difficult. When setting up two-factor authentication for a Google or Facebook account, you’ll need to manually configure a second password for apps and devices not designed to handle two-factor authentication. This includes running Exchange on a smartphone to access your Google email, contacts and calendars. This takes time but is thankfully a once only process.

Two-factor authentication can also make life difficult if you lose access to your mobile phone or can’t reach the mobile network. As a workaround Google offers its Google Authenticator mobile app for iPhone, Android and BlackBerry, which can generate codes when you’re offline. Facebook offers a similar app, but only for Android. Google also offers the option of printable one-time “backup codes” which you can keep in your wallet in case your phone is out of action.

Two-factor authentication is not a magic bullet for solving all of your online security worries, but it certainly helps. It’s also important to use strong passwords and not to use the same password for multiple services.

FacebookTwitterGoogle+Share

Recent News

snapdragon

Ever since the computer market shifted from desktop PCs to laptops, there’s been a significant balancing act going on between the needs of computer users for processing power to run programs, and the needs of those same users for battery power to keep their laptops going. At a simplified level, the harder you push a… More 

Apple-Apple

For the longest time, the generally accepted knowledge was that Apple’s Mac computers didn’t get malware or viruses. Apple even went so far as to mock its PC opposition in the famous “Mac vs PC” ads for the issues they had around security and malware, to a fairly solid effect. While Apple’s Macs do still… More 

intel

Quite often these days when we hear about a major security flaw, it’s to do with the underlying software that we’re running on our PCs, whether it’s a dodgy browser exploit, some kind of flaw in productivity software or even “free” content sites that are awash with malware. It’s not quite so often that we… More 

kindle

I’ve recently spent some time checking out Amazon’s latest Kindle e-reader, the 2nd generation Kindle Oasis. It’s the “luxury” choice in Amazon’s e-reader lineup, with a luxury price to match and a few new features to try to lure in those who love reading above other pursuits. One of the key new features is the… More