Facebook – Calls their system “login approvals” and you can verify via a text message code or through the Facebook app on your phone.Wells Fargo – Does not yet support two-step verification.įinally, be sure to secure the social media accounts for your local business:. FreshBooks – Does not yet support two-step verification.Bank of America – Offers their SafePass system which is their brand name for two-step verification.Log in to your account at Chase and add a mobile number to your profile. Chase – They don’t really promote two-step, but they do have it.Stripe – Uses two-step verification, but also uses the free Google Authenticator mobile app where you can create emergency backup code in case you need to disable two-step.customers and access to your online dashboard PayPal – Calls it a Security Key, but it’s still two-step and uses a text message to your mobile phone.This isn’t quite as secure as using a text message, but it’s still two-step verification. QuickBooks Online – Uses a confirmation email for their two-step verification.Next, enable two-step verification on your financial applications: Yahoo -Enabling two-step verification on Yahoo secures not only your Yahoo email, but your entire Yahoo account.Microsoft – This helps secure not only your email account, but your entire Microsoft account including Bing Places, Skype, and more.Google – This helps secure not only Gmail, but your entire Google account including Google My Business, Google+, Google Analytics, Google Webmaster Tools, and more.The first accounts to secure with two-step verification are your email accounts: So, even if a hacker somehow gets my username and password, they can’t access my account because they can’t see the text sent to my mobile phone. From then on Google “trusts” that device and I only have to use my username and password. I must enter that code to access my account. I correctly enter my username and password into Google, but then Google sends me a text message to my mobile phone with a code. You MUST do this.īut your second line of defense is to use two-step verification - also known as two-factor authentication - for all of your critical online accounts. Two-step verification requires you to enter an extra piece of information when the site doesn’t recognize the browser or device you are using.įor example, let’s say that I access my Google account using a new device for the first time. Your first line of defense against hackers is to use strong passwords and always use a different password for every site. What if a hacker, through a malicious browser extension, website, or sheer brute force, could somehow figure out my usernames and passwords? What would happen then? How to Use Two-Step Verification I went through the process to remove Not-So-Awesome Screenshot from my browser, but then my brain really kicked into overdrive … OK, lesson #1 … NEVER install a browser extension unless you know the company really well. Dang, I knew nothing about those guys! I quickly discovered that Awesome Screenshot has a reputation as adware and was automatically redirecting my browser to other sites. I have several Chrome extensions installed from highly reputable companies like LastPass and Google.īut I had also just installed a new extension called Awesome Screenshot. What woke me up is that I finally realized why my browser was redirected. I didn’t fall for it and chalked it up as just one of those Internet things. I had typed into my browser, but wound up on , a phishing site trying to get my personal info. I suddenly woke up panicked about something I had seen on my computer the day before. We had a fantastic dinner at Mercantile, enjoyed some amazing music at Dazzle Jazz, and had an overall wonderful, relaxing weekend until … This past weekend, I took my wife to Denver to celebrate her birthday. But there is one simple tactic, two-step verification, that can stop hackers in their tracks. If any of those got hacked, it could cost you a lot of time, money, and headache. Think about all of your email accounts, social media profiles, online banking, payment processing, and accounting systems.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |