Security

Security

Your privacy and rights online, securing your systems, plus relevant stories on hacking and system vulnerabilities and patching.

Two-Factor Authentication: Common Practices and Where to Enable It

When I mentioned to a few friends that I was writing a feature about two-step authentication, the typical response was an eye-roll and "Oh, that annoying thing?..." We've all had that thought when we needed to get a code before we could verify our identity online. However, after much research about two-factor authentication (often referred to as 2FA), I don't think I'll roll my eyes at it anymore.

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9