fbpx

Security 3 | What is two-step verification? The next step for better security!

Dit is een foto

Have you heard about the data leak at the Gelre Hospitals? “Hacking” remains a hot item. You do not want to allow anyone to access your accounts and data. Can you do something about it yourself besides using a strong random password as a next step to secure your online accounts? Of course! Use two-step verification! There are no arguments against it. We use it for every service that offers it.

Two-step verification is a must

By using two-step verification you increase your online security. With two-step verification it is no longer possible to log in only with your username and password. When logging in you need a second way of verifying. Think of receiving a text message with a code to your mobile number, a push notification with a code to your smartphone, a code from an authenticator app or a code that you have saved somewhere separately.

This offers extra security because someone with bad intentions generally only possess your username and password. They do not go beyond the first step during logging in. If they login you will receive a notification of an unknown login, after which you can immediately change your password. Your account is safe again. This is why two-step verification is a must!

Being hacked is still possible with two-step verification

Two-step verification makes hacking your online accounts a lot more difficult but not impossible. Hackers have succeeded in intercepting an text message with a code for two-step verification. This is a vulnerability in the Signaling System No 7 that is used to connect telephone networks. This system is used for making telephone calls and sending an text message.

It is also possible that hackers take over someone’s mobile number through sim-swapping. They then receive the calls and text messages from the relevant mobile number.

“Did you know that the vulnerability in the Signaling System No 7 abuses and sim-swapping are extremely labor-intensive? It actually only occurs with targeted attacks. The chance that this happens is much smaller than you being hacked because you use weak and or the same passwords.”

These arguments are regularly used in the news as a reason why two-step verification is not safe. We do not agree with this because these methods are so labor-intensive. They will not be used for hacking an account of a regular user. These methods are only used for people with a lot of valuable information.

Two-step verification through text message

Two-step verification through text message is in theory not completely safe but safe enough for the ordinary user. It is a method that also works when you switch from a smartphone. As long as you are connected to a mobile network you will be able to receive codes, at home and abroad. These are good arguments to at least choose this way of two-step verification.

Contact us with questions about two-step verification

Two-step verification by an Authenticator App

We always opt for the use of two-step verification by means of a Authenticator App. Connect the app on your smartphone to the two-step verification of the service. You have to generate a code in the app every time you log in. You will receive no more text messages. Choose this method if a service offers it. If a service does not offer it, it is not a no go! Two-step verification through text message is always safer than no two-step verification.

Generate and save backup codes!

When you switch to two-step verification, backup codes are always generated or you get the option to switch them on. Always choose this! You can print the codes on paper by clicking on prints, sometimes you can download them or just copy and paste them. We choose the latter and keep them in a safe place on our computers.

What to do if you lose the backup codes?

We hear people are often afraid that they can no longer access their account if their smartphone is broken, if you have a new number without having changed it in the accounts where you use two-step verification or if you lost the backup codes. It would be crazy if you could no longer access your account. In the event you are locked out, contact the service where you can no longer access your account. They will ask for data to verify it is you. This differs per service but it concerns things like your passport and other identification methods. The combination of data means they will give you access to your account again.

Accounts that offer two-step verification

We would like to give you an overview of services where you can apply two-step verification. Enable two-step verification with services like Apple, Google, Microsoft, Instagram, Facebook, Tumblr, LinkedIn, Twitter, Telegram, Slack, WhatsApp, Snapchat, Skype, Salesforce, Mailchimp, Dropbox, Adobe, Stripe, PayPal, Amazon, GitHub, Bitbucket, GitLab, Bugsnag, Buddy, 500px, Meetup, Reddit, Imgur, Coinbase, Spotify, Plex, AirBnb, Nest. At Two Factor Auth (2FA) you can look up most services which offer two-step verification

Conclusion: always activate two-step verification if it is possible.

Contact us if you have questions about two-step verification. We are happy to help you and are always open for a talk. We answer your questions and see how we can improve your online safety.

Your online concept starts at Snoober Media

A series about security

It is important to us to inform about online security. Therefore read the previous article, “Security 2 | Use secure passwords“, about security. Soon you will read a new article in this series. We will dive deeper into password.

Curious? Leave your details

    Also interesting

    Toegevoegd:

    Food for Thought

    Food for Thought 1 | Why are companies such as Instagram and TikTok so successful?

    Why are companies like Instagram and TikTok so successful? They must have something in common and that’s true. Their business models are based on the platform thinking theory. This often->

    Lees verder

    News SEO

    SEO 1 | 404 notifications are killing for your webshop or website

    Do you also get annoyed about 404 notifications? They are killing for your webshop or website. How do you make a cool 404 page? View the coolest we encountered below.->

    Lees verder

    Corporate identity News Snoober Media

    Come and have a look at our new workplace in Zutphen?

    What a euphoria! As of November 1st we will be located in our new office at the Kuiperstraat in Zutphen. A new place to do our customers and our own->

    Lees verder

    Webshop

    E-Commerce 4 | Are you already lagging behind with your webshop for the holidays?

    What about the preparations for the holidays? The stocks for Black Friday and Christmas must have been ordered and delivered by now. Of course you also have your content calendar->

    Lees verder

    News Safety

    Security 7 | Why does WordPress security remain such a hot topic?

    You regularly hear messages in the media about the hacks and malware that nestle in unsafe installations of WordPress. So much is being written about it that we’ve noticed our->

    Lees verder

    News Snoober Media

    Terms and Conditions 1 | Changes per May 10, 2019

    For us it is important that you know what agreements we have with each other. Transparency is a high priority for us. Our newest terms and conditions take effect today,->

    Lees verder

    Webshop

    E-Commerce 3 | Are you already focussing on Black Friday and Christmas of 2019 as a webshop owner?

    Do the next holidays seem far away for you? Let me tell you they are not. To make full use of the shopping madness around Black Friday, Cyber Monday and->

    Lees verder

    News Wordpress

    WordPress 2 | 5 important WordPress tips

    Do you know that WordPress is older than Facebook and Twitter? It is therefore not surprising that WordPress as CMS has the largest market share. It fluctuates but WordPress always->

    Lees verder

    Follow us on Instagram, Facebook and Twitter

    No images found.

    Leave a Reply