In 2017, Steve Burgess published a piece titled “How to Avoid Being Hacked, Part 2: Two-Factor Authentication.” The use of multi-factor authentication (mfa) makes it far more difficult for a hacker to get access to your online belongings. Two-factor authentication is the most frequent kind of multi-factor authentication used by consumers (2fa). The debit card is a kind of two-factor authentication that is used rather often. When you insert the card into an automated teller machine, you are required to supply a pin in addition to the magnetic information that is stored on the card itself. These days, the chip is used to store this information. It’s easy to use and does a decent job of preventing other people from accessing the cash you have in your ATM. The use of two-factor authentication is essential for your online accounts, including your email and iCloud accounts. I will be the first to admit that having to do something extra in order to access your account can be a bit of a hassle. However, it is a lot less of a hassle than having your identity stolen, losing access to your email, or having to explain to your friends why you have said such crazy things about them (unless, of course, you actually said those crazy things on purpose!). at the very least, the possibility of someone signing in to one of your gaming accounts under your name. This is an explanation of how two-factor authentication, sometimes known as 2FA, works for a few distinct kinds of online accounts. Note that these services are known to make adjustments on a regular basis; thus, it is important to stay informed about any changes that may occur. Implementing Google’s Two-Step Verification System You begin by logging in to your Gmail account using your user name and password (we will discuss how to choose secure passwords in the third part of this series). a circle containing an avatar ought to be located close to the upper-left hand corner of the window of the computer. It might even be a picture of you yourself. If you click on it, you will see the phrase “my account.” That being said, this is something that changes every few of years. Select “sign-in & security” from the menu that appears in the new window that has opened. To begin, choose “get started” after clicking on “two-step verification.” Once again, it is time for you to enter your login and password. It is necessary to enter a phone number and then choose whether you would like to receive a phone call or a text message. After that, you will immediately get a phone call or text message with a six-digit verification number. To activate two-step verification, you will need to key it in and then pick the option. It’s as simple as that. Okay, there are a few stages involved, but it’s not hard at all. It is possible that you would rather gather your Gmail messages using another application, such as Outlook, rather than using a web browser to access the Gmail website where you may send and receive messages. If this is the case, it is possible that once you have enabled two-step verification, your Outlook (or another application) may continue to inform you that you have entered the incorrect password, despite the fact that you are very certain that it is correct. I have experienced this firsthand. It is quite likely that you will need Google to provide you with a designated app password, which Google will then create for you. To access the app passwords page, which can be found at this location at the time of this writing, you will need to navigate to this website. Pick the application that you want it for (if you are using Outlook, you would choose “mail”), and then choose the device that you are using (google magically presents a list of the devices you use with their services). Choose “generate” from the menu. It will display a sixteen-digit number in a yellow bar for you to use as your new password for that application (for example, Outlook) on that device (don’t input the spaces). In the event that you find yourself in need of that number at a later time, you may keep that password in your app. yahoo! It is comparable to Yahoo! Sign in to your account, go to the page that deals with account security, click on the “two-step verification” option, and then toggle the button that is located there to activate it. You may choose to get a phone call or a text message throughout the verification process. The code that is sent to you by text message or phone call should be entered. At this point, you are able to generate an app password, with the procedure being quite identical to the one described above for Google, for your different applications, such as Apple Mail or Outlook. icloud Now, let’s get started with setting up two-factor authentication on your iCloud account. First things first, you need to make sure that your iPhone or iPad has a passcode set up. The settings app should be selected. Choose “passwords & security” from the drop-down menu that appears after clicking on your name (or the name of the account you use to sign in) if your device is running iOS 10.3.3. Did I mention that this will be different in the future? Apple is known for keeping us on our toes by constantly modifying things despite the fact that we have been used to the prior version. When you were using the most current version of the previous version, you would have clicked on settings, then on iCloud, then on your name, and last on password and security. But I’m getting off topic… Now, choose the option to “disable two-factor authentication.” Be ready to respond to a few security questions, which will be covered in a subsequent article. After that, you will be required to enter the phone number where you would like to receive the code for 2FA. Additionally, you will be required to choose whether you would prefer to receive a text message or give a phone call. To get the account information for a macintosh, enter the system settings menu, pick iCloud, and then click on “account details.” In order to log in, you may be required to use your Apple credentials. Please respond to the security questions provided above. For the purpose of verification, you should provide the phone number where you would want to receive calls or messages if it asks for it. Once again, a magical robot will bring you the code in a second, and you will need to type it into the field that is waiting for your response. In the event that an unknown device or location logs into your account after it has been activated, you will get a message requesting your permission to do so. It is important to keep in mind that on a Mac, the notice may sometimes be shown in a window that is concealed behind another window. If you are experiencing difficulties in obtaining the permission request, you should check for this window. When we talk about problems, it may seem to be a lot of effort to have two-factor authentication, but once it is set up, it is not too much of a hassle, and it will offer a significant amount of security to your accounts, as well as a significant amount of obstacles to prospective hackers. Do it, then! When we meet again, we will talk about passwords, passcodes, and the reasons why you shouldn’t fill out those delightful surveys that all of your friends send you in the mail. Next, in the third section, we will discuss selecting clever passwords and secret questions (aka, giving away the form).