|

Passwords are a traditional, but relatively weak, way of protecting your accounts. They are easily stolen and, if they are poorly chosen, they're really easy to guess. The same goes for physical safeguards, like keys or fingerprints - they're easily stolen, lost, copied or obtained by coercion.

So what can you do? Simple. You need to use more than one. That's exactly what lots of companies are doing with two-step verification or authentication - asking for a password and a code that you receive via your mobile phone.

Below, we explain what two-step verification is, how to activate it on your favorite websites, and what you need to do to make sure it works!

What is two-step verification?

When you use your credit card to take money out of an ATM, you're actually using two-step verification, probably without even realizing. First you insert your card (a physical object that you possess) and then you enter a PIN code (something you know).

This is exactly what two-step verification is - using two forms of identification instead of just one. So, instead of just using a password, you might use a password, plus a code that you receive on your cellphone.

Multi-factor authentication (via Validity Sensors, Inc.)

There are lots of ways to verify your identity. Just to start, you've got passwords, fingerprints, facial recognition, pattern creation, PIN codes, geographical location and more, so combining two is pretty easy.

How does two-step verification work?

The first step is the one you're already familiar with: entering your user name and password just like you normally do.

The new part is the appearance of a second step: entering a code that you receive via your mobile phone.

Once you've entered the code, the PC, tablet or mobile phone that received it will be marked as a trusted device and from then on, you'll be able to log in with your password, without any extra codes.

What happens if I lose my phone or I haven't got mobile coverage?

If you lose your phone, then you DO have a problem, since the code is sent to the number you entered on your account. Even so, if you lose your phone, you can still....

  • Access your account via another trusted device
  • Use back up codes you've already printed out or obtained elsewhere

If you can't do either of these things, you can really only get a new phone with the same number or inform the website in question and follow their steps for recovering your account, a process that normally takes a few days.

If you happen to be traveling abroad or you can't get a mobile signal, you can use an application that can produce a code offline, or using codes that you have already printed off.

If you use a smartphone, we recommend Google Authenticator (Android, iOS) or Authenticator (Windows Phone), apps that produce a code even if you don't have an internet connection. These codes are interchangeable, because they use a standard - RFC6238.

Ok, but why only two steps? Why not three?

Practicality! There's nothing stopping you from using more than one verification system, but if using two is already a pain in the butt, imagine three or more!

The combined use of a password and a randomly-generated number significantly reduces the risk of unauthorized access, so we're pretty happy leaving the steps at two!

Why have so many websites suddenly decided on two-step authentication?

It's true, more and more websites are beginning to use two-step verification.Recent converts include Microsoft, Google, Dropbox and Twitter, to name but a few.

But why have they chosen now to make the change? Well, there are three main reasons that probably encouraged them to make the jump:

  • More and more websites are choosing to centralize services under a single account (think of Google and Microsoft, for example)
  • More users own multiple devices with internet access
  • There are an increasing number of massive hacking attempts, like the one Twitter suffered back in February

Why is two-step verification optional?

Two-step verification is largely optional because of user privacy concerns - some people don't want their account connected to a telephone number. To get around this, some services offer physical code generators, like the Battle.net Authenticator, a keychain that generates codes when requested by the owner.

How do I activate two-step authentication?

This depends on the service. In most instances, you can log into your account, go to the account or security settings and activate it from there. To make it easier, we've collected the official instructions from several websites below:

Is two-step verification infallible?

Not completely. If you were really unlucky, a hacker could get his or her hands on your phone and also somehow know your password. Alternatively, someone who knows your password could have access to a device that has already been marked as trusted.

Trojans and phishing are two more dangers. If a hacker manages to convince you that they are a legitimate entity or, via some other means, intercepts your data, you're totally exposed. Some Trojan viruses even manage to coordinate their actions, with a PC virus modifying what you do online, and another one on your phone intercepting the codes.

To minimize these risks, you need to add extra layers of security to your devices, like decent anti-viruses and good device passwords. Although two-step verification is very effective when it comes to minimizing the risk of intrusion, the bad guys aren't stupid and will look for other ways to get their hands on your information. Remember to always stay alert, and be on the look out for anything strange or suspicious.

What about you? Are you using two-step verification yet?

Via OnSoftware ES

?

Commented

  • Ed |
    29/04/13
    Ed

    Please tell me I'm wrong. If i give my phone number to, say, Yahoo. Will I see an increase in that wonderful, TEXT SPAM?

  • |
    30/04/13

    Hey Ed,

    That's a valid concern. In my experience, the big names like Google, Dropbox and Wordpress wouldn't risk their reputation and personally, they've never spammed me. You can never rule it out 100%, but by sticking to the really well-known names, I think the likelihood is low.

  • steve |
    14/05/13
    steve

    I only have my desktop PC and a landline phone, is there any way I would be able to use two-step verification or another system that would enhance my security other than just the username/password system?

24/07/14
Your avatar