Insecure Feeling: Google’s Two-Step Authentication Process

It’s like that joke that nobody gets but no one speaks up and says, “What’s so funny?” Well if you’ve ever been hacked, you get it. The need for tighter online security measures, that is. While your personal computer may not have been exposed, chances are that your personal information on a third-party database has. To further complicate the issue, when a major retailer’s security has been breached and its database hacked, the infringement may not be announced for some time.

Usually the first sign that your personal information isn’t so private anymore will be when your bank suddenly issues you a new credit card before the current one expires. Or you scan your monthly statement and wonder who you know in Zambia…or you half-hear a news broadcast that a store you frequent had a security issue a few months back -oh now they tell you!

We all love the convenience of eCommerce shopping. And it’s important to realize that due to the level of expertise required that hacking a major database rarely occurs. Unfortunately that means that gaining access to your personal computer is much easier and far more likely. So what can you do to protect yourself and your personal information? Well, first gain a basic understanding of how this can happen. Few realize that our transactions and other popular forms of online entertainment and communication can lead hackers right to our ‘door’ or portal.

Many of us use a simple password and use the same password for everything. The most popular passwords are children or spouse’s names and their DOB. Third runner up is a pet name, etc. A dedicated hacker need only read public information on a social media outlet to learn enough about a person, their family and their shopping preferences. Before you scrap your favored access codes for ones too complicated to remember, see if Google’s authentication app might work for you.

Many single-step authentication processes are in use and are highly effective. Google, however, has devised a two-step authentication process to throw hackers off their game and increase security for its users. It’s a combination of ‘something you know’ namely your password and ‘something you have’ a smart phone. Just download their special authenticator mobile app. It can be used to send a code to your phone (which hackers won’t have physical access to) so your account remains secure even if your password is compromised.

If you are a business owner however, you might be wondering how you can make your online company more secure from a possible security breach. Give Active Web Group a call. We’ve been assisting businesses of every size to grow and maintain their market-share. We use the latest trends and technologies to assist our clients to achieve their online business goals. Give us a call today!

For more information about securing your online business presence, call us at 1-800-978-3417 or Contact Active Web Group and let us help you!

Facebooktwittergoogle_pluspinterestlinkedinmail