Table of contents:
- How does it work
- Where to use
- Passwords
- Meta accounts
- Social services
- Cloud storage
- Money
- Notes
- Blogs
2024 Author: Malcolm Clapton | [email protected]. Last modified: 2023-12-17 03:44
But Pasaran!
Millions of logins and passwords for postal and social services in the public domain, interesting photos of famous people that only the most lazy and moralists have not seen. Recent events have proved to us better than any information security expert that a password, even a complex one, is no longer a valid protection tool.
The preferences of users in the choice of a particular service are radically changing. If earlier the most convenient option took root, now it is the most protected.
Today, the best way to protect in terms of reliability / convenience is two-factor authentication - an authentication method in which the user specifies data of two different types. Simply put, this is double protection.
How does it work
The first line of defense is what a person knows and remembers, that is, the usual login + password combination. But the password does not give access to the account, but acts as an activator for the second line of defense.
The second line of defense is what only this person has. Digital code sent as SMS, email or voice message, as well as a standalone device or biometric reader.
The cheapest and most convenient methods are app and SMS. We enter the username and password on the site, after which we receive an SMS with a code on the mobile. We enter the code, and we have access to the data.
Two-factor authentication not only acts as a second line of defense, but is also an excellent means of notifying when an attacker tries to gain access to your account. Imagine that you are not trying to enter anywhere, and suddenly you receive an SMS with a confirmation code. Someone knows your password! It's time to change it.
Depending on the type of two-factor authentication, an attacker will need your mobile device to access your data, or a copy of your SIM card, or access to the mail, which receives confirmation codes, but in the case of biometrics, your eyes will be cut out or your finger will be cut off.
As you can see, the use of two-factor authentication minimizes the risks if we are talking about a simple user who does not have any particularly valuable information. It's enough that with its help we make our accounts resistant to password guessing tools and deny access to personal data to everyone who somehow found out our password.
Where to use
There are people who consider double protection unnecessary for some services, and especially those where all data is public. We believe that protection is needed everywhere. Do you think that your service will not be hacked due to the fact that it contains only publicly available photos? What if an evil joker gains access to your account and starts uploading pictures with Afrogea on your behalf? Or just delete everything? In general, you cannot neglect additional protection if you are given it.
Unfortunately, users do not always adequately respond to the obvious increase in the threat, but even worse is the fact that many popular services still do not provide the ability to use two-factor authentication. I'd love to include it, but it just isn't provided. However, not everything is so bad. We have prepared for you a list of priority services that are extremely popular in Russia and support two-factor authentication. To switch on two-factor authentication, just click on the service you need.
Passwords
+
Meta accounts
- ;
- ;
- .
Social services
- «»;
- ;
- ;
- .
Cloud storage
Money
- «»;
- .
Notes
Blogs
Also watch out for specifying the availability and type of two-factor authentication for each one.
Are we missing something? Leave the names of services and links to configure two-factor authentication in the comments. We will add them to the post.
Recommended:
Should you choose between diet and exercise if you want to lose weight?
When it comes to losing weight, there are two extremes: strenuous exercise and a strict calorie restriction diet. The middle ground is a combination of regular exercise and nutritional control. But lately, the scales have been tipping towards diet, which seems to play a bigger role in the weight loss process.
How to enable Night Shift on macOS and why you should do it
Night Shift, familiar to iOS users, now works on Mac. Lifehacker tells why you need it and how to turn it on
How to enable cookies in your browser and why you need it
What are cookies, why are they needed, and where to find them in the settings. Simple instruction for users of the most popular browsers
Use two-level authentication with Dropbox
Two-level authorization means in the bottom line only one thing for Dropbox users - if an attacker has a username and password for your account, he will still not be able to access your account and valuable files that you store in it
How to enable PIN authorization in Windows 10 and why you need it
In Windows 10, Microsoft has added a PIN authorization feature. It is somewhat inferior in strength to a regular password, but much more convenient than it