2-factor Authentication helps protect your identity.
You should deploy 2-factor Authentication. This increases your security and reduces your chances of becoming an identity theft victim. Most services encourage 2-factor Authentication and let you deploy it at no additional cost.
Here’s a quick question for you.
When attempting to access a website, the website can challenge you based on:
A) What you know (e.g. password).
B) Who you are (e.g. fingerprints).
C) What you have (e.g. phone).
D) All of the above.
Correct answer: D.
How it looks in real life.
Daisy runs a dental office in Folsom, CA. Keeping the practice up and running is her top priority. She runs most of her patient, insurance and vendor communications through her Gmail account. She deploys 2-factor Authentication with the steps at https://myaccount.google.com/signinoptions/two-step-verification/enroll-welcome. She keeps her smartphone nearby. She knows that when she logs into her Gmail account, or any Google service for that matter, Google will send her a six-digit code.
She goes to work one Monday morning. She logs into her Gmail account then receives a text message. It reveals the current six-digit code. She enters that into the Google PIN prompt and reads her email. Pretty simple, after the initial setup and overcoming the “am I doing this right?” doubts.
Daisy realizes that 2-factor Authentication resides on a) what you know and b) what you have. Daisy knows her Gmail password. Daisy has a PIN that Google sends to her smartphone. Daisy has 2-factor Authentication. She knows that even if someone guesses or steals her Gmail password, they do not have the PIN and they do not have her smart phone.
It works for Daisy.
Daisy works hard. She makes sure the practice’s security meets modern standards. She maintains strong passwords and protects client data. She also knows if something is complex, she might as well contract out the work to someone who does security work and can get it working right, the first time. Setting up 2-factor Authentication is not something to take lightly.
—
Content from How Hacks Happen and how to protect yourself. Visit https://howhackshappen.com and view three chapters online for FREE today or visit https://www.amazon.com/How-Hacks-Happen-protect-yourself/dp/0983576920/. By Mark Anthony Germanos, of https://cybersafetynet.net/about-cyber-safety-net/.