The process of proving who you are (called authentication) is key to protecting your information. Strong authentication attempts to ensure only you can access your information, such as email, your photos or your bank accounts. There are three different ways to confirm who you are:
- what you know (such as a password)
- what you have (such as your driver’s license)
- what you are (such as your fingerprint)
Each one of these methods has advantages and disadvantages. The most common method is passwords, which are something you know. In this blog, we are going to learn how to protect yourself with two-step verification, something far more secure than just password and yet very simple to use. To better understand two-step verification, we need to start with password first.
Passwords prove who you are based on something you know. The danger with passwords is that they are a single point of failure. If someone can guess or gain access to your password, they can then pretend to be you and access all of your information that is secured by it. This is why we have to know the steps to protect our password, such as using strong passwords that are hard for others to guess, using different passwords for each account or never share your passwords with others.While this advice remains valid, passwords are outliving their usefulness; they are no longer effective in today’s modern age. The latest technologies make it far too easy for cyber attackers to compromise passwords. What we need is an easy to use, yet more secure solutions for strong authentication. Fortunately, such an option is now commonly available. It’s something called two-step verification.
Two-step verification (sometimes called two-factor authentication or 2FA) is a more secure solution than just passwords. It works by requiring two different methods to authenticate yourself. One example is your ATM card. When you withdraw money from an ATM machine, you are actually using a form of two-step verification. You need two things to access your money: your atm card(something you have) and your PIN number (something you know.) If you lose your ATM card, your money is still safe. Anyone who finds your card will not be able to withdraw your money, as they do not know your PIN. (Unless you wrote your PIN on your card, which is a really bad idea.) The same is true if they only have your PIN and do not have the card. An attacker must have both to compromise your atm account. This is what makes two-step verification so much secure; you have two layers of security.
Using Two-step Verification
Two-step verification is something you set up individually for each of your accounts. Fortunately, many online services now offer it. One of the leaders in two-step verification is Google. Google accounts are a prime target for cyber attackers, as they offer a variety of free, online services to million of people around the world. As such, Google needed to provide stronger authentication. It was one of the first organization to roll out two-step verification for most of its online services. If you understand how Google’s two-step verification works, you will understand how two-step verification works for most other sites, such as Twitter, Facebook, Apple, Instagram and many banks.
First, we need to enable two-step verification on Google Account and should register our mobile phone number. Once completed, two-step verification works as follows.
- You log into your account just as before with your username and password. This is the first of the two factors–something you know.
- Google then sends a text message to your mobile phone containing a unique code, especially, a string of six numbers. Just like your password, you then enter those six numbers on your website. This is the send of the two factors.
To successfully log into your account, you have to both know your password and have your mobile phone receive the unique codes. Even an attacker has your password, they cannot access your Google account unless they also have your phone. To ensure your account is truly secure, Google will send you a new, unique code every time you log in.
There is another option for two-step verification ith Google and many other sites. instead of receiving a unique code via SMS text messaging, you can install an authentication app on your smartphone. The app generated the unique code for you every time you want to log in. The advantage to using a mobile app is you do not need to be connected t a phones service to receive your unique code; your phone generates it for you. In addition, since the code is generated locally on your phone and not sent to you, it cannot be intercepted.
Remember, two-step verification is not enabled by default; you have to enable it yourself. While two-step verification may seem like more work a first, we highly recommend you use it whenever possible, especially for critical services, such as your email accounts, online banking, social media account or storing your files online. Two-step verification goes much further to protect your information than just simple passwords.