Two-factor authentication explained: How to choose the right level of security for every account
- Brian Burke-Gaffney
- Apr-11-2019
- Business Technology
- Comments Off on Two-factor authentication explained: How to choose the right level of security for every account
If you aren’t already protecting your most personal accounts with two-factor or two-step authentication, you should be. An extra line of defense that’s tougher than the strongest password, 2FA is extremely important to blocking hacks and attacks on your personal […]
Read MoreTwo-factor authentication explained: How to choose the right level of security for every account
- Brian Burke-Gaffney
- Apr-11-2019
- Business Technology
- Comments Off on Two-factor authentication explained: How to choose the right level of security for every account
If you aren’t already protecting your most personal accounts with two-factor or two-step authentication, you should be. An extra line of defense that’s tougher than the strongest password, 2FA is extremely important to blocking hacks and attacks on your personal […]
Read MoreYou can now use your Android phone as a security dongle for two-factor authentication
- Brian Burke-Gaffney
- Apr-10-2019
- Business Technology
- Comments Off on You can now use your Android phone as a security dongle for two-factor authentication
Google now has a new way of enabling two-factor authentication: using your phone as the near-equivalent of a physical security key.You should already be familiar with two-factor authentication: Typically, you’ll secure a web-based application like Gmail by not only inputting […]
Read MoreYou can now use your Android phone as a security dongle for two-factor authentication
- Brian Burke-Gaffney
- Apr-10-2019
- Business Technology
- Comments Off on You can now use your Android phone as a security dongle for two-factor authentication
Google now has a new way of enabling two-factor authentication: using your phone as the near-equivalent of a physical security key.You should already be familiar with two-factor authentication: Typically, you’ll secure a web-based application like Gmail by not only inputting […]
Read More
