Saturday, March 6, 2021
  • At Least 30,000 U.S. Organizations Newly Hacked Via Holes in Microsoft’s Email Software
  • HAFNIUM Exchange Zero-Day Scanning
  • John McAfee Indicted for ICO Manipulation, Securities Fraud
  • BSides Calgary 2020 – Noor Abid’s ‘Using Biometrics (Gait) For Security Applications’
  • Employee Appreciation Day: A Big Thank You to Our Amazing Employees

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Data Security Identity & Access SBN News Security Bloggers Network 

Home » Cybersecurity » Data Security » Save the Embarrassment: The Value of Two-Factor Authentication

Save the Embarrassment: The Value of Two-Factor Authentication

by Tyler Reguly on July 30, 2018

These days, it’s not a matter of if your password will be breached but when.

Major websites experience massive data breaches at an alarming rate. Have I Been Pwned currently has records from 295 sites comprising 5.3 billion accounts. This includes well-known names like LinkedIn, Adobe, and MySpace.

Password breaches are a cause for embarrassment; they are talked about in hushed tones just like finding mice in your home or having your credit card declined. They don’t need to be, though; they are part of the online experience associated with a modern cyber life.

Instead of being embarrassed, take steps to minimize the impact that a data breach has on your life.

One of the best ways to do this is to enable two-factor (or multi-factor) authentication on the accounts that you use on a regular basis. Adding a second form of authentication (typically in the fashion of a code generated by or sent to a device you own) can ensure that no one accesses your accounts even if they have your passwords.

Here you will find step-by-step instructions on how to configure two-factor authentication on some of Internet’s most popular websites.

Facebook

  • Log into Facebook and visit Settings.

Save the Embarrassment: The Value of Two-Factor Authentication - Facebook

  • On the left hand side, select Security and Login and click Edit next to Use two-factor authentication.

Save the Embarrassment: The Value of Two-Factor Authentication - Facebook

  • Set up the 2FA methods of your choice. I recommend Text Message and Authentication App, at a minimum.

 Google

  • Visit your Google Account page and follow the Signing in to Google link.

Save the Embarrassment: The Value of Two-Factor Authentication - Google 3

  • Select 2-Step Verification and follow the steps to enable Authenticator, SMS, or Google Prompt 2FA. Note that some applications may stop authenticating and require application specific “App Passwords.” You can read more about those here.

PayPal

  • Log into PayPal and visit Settings.

Save the Embarrassment: The Value of Two-Factor Authentication - PayPal 4

  • Click Security and look for the Edit (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tyler Reguly. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/value-two-factor-authentication/

July 30, 2018July 30, 2018 Tyler Reguly facebook, Featured Articles, IT Security and Data Protection, Paypal, Twitter, two factor authentication
  • ← The Top 20 Penetration Testing Tools, Part 2
  • Week 30 Cyberattack Digest 2018 – COSCO, Jefferson County School, Idaho Department of Correction and others →

TechStrong TV – Live

Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Edge Computing Growth Drives New Cybersecurity Concerns
Twitter Removes Russian Disinformation Accounts
Survey Finds Low Confidence in Medical Device Security
Unknown Hacker Grabs Gab’s Data, DDoSecrets Doesn’t Leak it
Chinese Exchange Hack: At Best, Microsoft is Incompetent
Payroll/HR Giant PrismHR Hit by Ransomware?
Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…
Tactical Approach to Combat Cyber Attacks in 2021
Why Less Can Be More When It Comes to Cybersecurity
Developing in the Cloud vs. Developing in Local

Upcoming Webinars

Tue 09

Zero Trust Journey – A Security Leader’s Story

March 9 @ 11:00 am - 12:00 pm
Mon 15

Don’t Get Attached to Your Attachment!

March 15 @ 9:00 am - 10:00 am
Mon 15

Managing Security in a Decentralized World

March 15 @ 1:00 pm - 2:00 pm
Wed 17

API Security: Everything You Need to Know To Protect Your APIs

March 17 @ 1:00 pm - 2:00 pm
Mon 22

The Main Application Security Technologies to Adopt in 2021

March 22 @ 1:00 pm - 2:00 pm
Tue 30

Application Security in the Rapid Digital Transformation Age

March 30 @ 1:00 pm - 2:00 pm
Wed 31

The Anatomy of an Account Takeover Attack

March 31 @ 3:00 pm - 4:00 pm
Apr 01

Pharma Drama: An Interactive Crisis Simulation of an Insider Threat

April 1 @ 11:00 am - 12:00 pm

More Webinars

Download Free eBook

The State of Cloud Native Security 2020

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Decentralizing Cloud Security Management
Cloud Security Cybersecurity Governance, Risk & Compliance Industry Spotlight Security Awareness Security Boulevard (Original) 

Decentralizing Cloud Security Management

March 5, 2021 Michael Salleo | Yesterday 0
A Close Call Prompts Security Reassessment
Application Security Cybersecurity Data Security Industry Spotlight Malware Security Boulevard (Original) 

A Close Call Prompts Security Reassessment

March 4, 2021 Rui Ribeiro | 2 days ago 0
Breach Clarity Data Breach Report: Week of March 1
Cybersecurity Industry Spotlight Security Boulevard (Original) Threats & Breaches Vulnerabilities 

Breach Clarity Data Breach Report: Week of March 1

March 3, 2021 Kyle Marchini | 3 days ago 0

Top Stories

Chinese Exchange Hack: At Best, Microsoft is Incompetent
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security Featured Identity & Access Incident Response Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Chinese Exchange Hack: At Best, Microsoft is Incompetent

March 4, 2021 Richi Jennings | 1 day ago 0
Unknown Hacker Grabs Gab’s Data, DDoSecrets Doesn’t Leak it
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Incident Response Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Unknown Hacker Grabs Gab’s Data, DDoSecrets Doesn’t Leak it

March 2, 2021 Richi Jennings | 3 days ago 0
‘Dangerous’ RCE in VMware: Patch, or the Puppy Gets It
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security DevOps Featured Identity & Access Incident Response Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Dangerous’ RCE in VMware: Patch, or the Puppy Gets It

February 26, 2021 Richi Jennings | Feb 26 0

Security Humor

via     the comic delivery system monikered   Randall Munroe   resident at   XKCD  !

XKCD ‘Manage Your Preferences’

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2021 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.