The latest developments in IT security: your rights online, securing your systems via timely patching, updates on anti-malware tools, and relevant stories on hacking and system vulnerabilities.

Two-Factor Authentication: Common Practices and Where to Enable It

When I mentioned to a few friends that I was writing a feature about two-step authentication, the typical response was an eye-roll and "Oh, that annoying thing?..." We've all had that thought when we needed to get a code before we could verify our identity online. However, after much research about two-factor authentication (often referred to as 2FA), I don't think I'll roll my eyes at it anymore.

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9