{"id":340,"date":"2014-05-11T15:23:00","date_gmt":"2014-05-11T15:23:00","guid":{"rendered":"https:\/\/ntegrait.com\/two-step-verificationauthentication-or-2fa-time-to-protect-your-small-business-accounts-from-attack.html"},"modified":"2024-02-06T11:41:36","modified_gmt":"2024-02-06T11:41:36","slug":"two-step-verificationauthentication-or-2fa-time-to-protect-your-small-business-accounts-from-attack","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/two-step-verificationauthentication-or-2fa-time-to-protect-your-small-business-accounts-from-attack\/","title":{"rendered":"Two Step Verification\/Authentication or 2FA \u2013 Time to Protect Your Small Business Accounts From Attack"},"content":{"rendered":"
Passwords are not as secure as they used to be.\u00a0 Unwanted cyber snoopers with enough determination can identify even the strongest passwords.\u00a0 And if you are one of those people who uses the same password on all of your accounts to save your own brain power, then you are even more vulnerable.<\/p>\n
So, what to do?\u00a0 Two Step Verification\/Authentication or 2FA.\u00a0 Google was the first Internet company to use this on their accounts like GMAIL, and now the major companies like Apple, LinkedIn, PayPal , Twitter, Microsoft, Facebook, Amazon and Yahoo (to name a few) have set up this process.<\/p>\n
First you sign in with something you know \u2013 your user ID and your password.\u00a0 Then you will be prompted to enter a numeric code that was sent to your smartphone.\u00a0 So, even if the cyber sleuth has your password, they have to have your phone with the numeric code to complete the sign in process.\u00a0 This is the same technology that ATM machines use \u2013 you have something you know \u2013 your PIN and something you have \u2013 your encrypted ATM card.<\/p>\n
Now, it is not always easy to set up the 2FA on all of your accounts.\u00a0 But it is important.\u00a0 Your customer data and banking information is vulnerable and could mean the end of your business if it was hacked or stolen.<\/p>\n
This list is by no means complete.\u00a0 For a more complete listing and details for enabling 2FA, try Evan Hahn\u2019s more exhaustive list:\u00a0 http:\/\/evanhahn.com\/2fa\/<\/a>.<\/p>\n This sounds like a lot of work \u2013 but isn\u2019t your business worth it?\u00a0 Wasn\u2019t it a lot of work to set it up and get it to this point?\u00a0 And, this can\u2019t be stated strongly enough \u2013 you should also make sure you use a unique, secure password for each of your accounts, so if you don\u2019t, <\/strong>now\u2019s a good time to change that<\/strong><\/a>.<\/strong><\/p>\n \u00a0<\/p>\n","protected":false},"excerpt":{"rendered":" Passwords are not as secure as they used to be.\u00a0 Unwanted cyber snoopers with enough determination can identify even the strongest passwords.\u00a0 And if you are one of those people who uses the same password on all of your accounts to save your own brain power, then you are even more vulnerable. So, what to…<\/p>\n","protected":false},"author":5,"featured_media":341,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-340","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\n