Friday, 30 October 2020 06:02

Two-factor authentication (2FA) - 2-Step Verification

Written by
Rate this item
(0 votes)
Online Security should always be a priority. Online Security should always be a priority.

Some of you have already used 2-Step Verification. You may not have known what it was called, and most people think it's a pain in the butt.

You are not alone. Less than 20% of people are currently taking advantage of 2-Step Verification. However, it's time to start using 2-Step Verification to secure your accounts and data.


I am guessing most people do not know about 2-Step Verification, so I'll explain what and why, evil characters, and a list of links for Google, Facebook, and some other popular sites so you can activate 2-Step.


First, think about how much of your personal information is on your laptop, desktop, tablet, and your smartphone. There's a lot more information than most people realize. Over 1.5 billion people have a Google account, which contains your Gmail account, and if you access the web with Google's Chrome browser, you probably kept the default settings. So here are a few things you should know. Your Google account saves passwords, addresses, contacts, current location, and more. Google accounts connected to your smartphone will keep a very detailed report of where you have been, and I'm not talking about your browser history. Smartphones can keep track of when you were home, when you left, where you went, and when you got back. It will tell you the distance, addresses, and if you were driving or walking.


And it's not only Google. Browsers, apps, mobile devices can all track locations using GPS, Wi-Fi networks, and cell phone towers. Don't believe me? How does Uber or Lyft know where to pick you up? If you fly or drive to another time zone, what happens? Your phone updates the time? Local weather, news, sports scores all push notifications based on your location or settings. You may be asking how does it know where my desktop is located — the IP address from your Wi-Fi.


Geolocation and technology have made life so much easier. We just need to realize how much of our data is saved on our Google accounts, cloud services, computers, and mobile devices. Yes, the devices we love and depend on, have all of our information; data that can be stolen or wiped away in an instant.


The second thing to think about is all the government agencies, hospitals, and companies hacked in the past couple of years. Malware or ransomware installed right on the server — the best servers, running the best security software available, and an experienced IT staff. It can happen to anyone reading this, and the odds are it will.


Therefore, here are a few actions you "Don't" do.

Any of these actions could let someone steal your password:

  • Downloading a file from the Internet, you're not sure about.
  • Clicking on a link in an email that you're not sure about.
  • Visit a website that's not secure.
  • Use the same password for every account.
  • Use easy passwords - Not good (123456 or 123abc)Good – 4smart#PaSS7
  • Give a friend or coworker access to your computer.
  • Input your user name and password when using a public Wi-Fi (coffee shop, hotel).
  • Reply to emails that say we have pictures or videos of you doing something.


If you're unsure about an email link or attachment, delete it.

I know it's a pain in the butt to remember passwords, but that won't be a problem when using "Remember Me" along with 2-Step-Verification together as you will soon see. However, a crazy password is better than the following, and some accounts may not yet offer 2-Step Verification or another second verification method.

 2-Step Verification to secure your accounts and data.

Let's say an Evil Character has hacked your Google account and has access to your information including all the passwords you have saved in your Google account


In most cases, these people just don't steal your password but much more, maybe even your identity.

Imagine someone having access to your accounts and everything in your accounts. Passwords, credit card info, addresses, work or website logins, emails, photos, personal and medical documents, I'm sure you get the idea!

If your password is stolen, evil characters can lock you out of your account, and that's not a road to travel.


Delete all of your emails, contacts, photos, everything. Gone forever!

Use your email to send spam, malware, and viruses to all your contacts. And since the email is from you, your contacts think it's safe.

  • Reset passwords for your other accounts (banking, credit cards, loans, medical).
  • Post sexual content, hate, and negative post on your social media.
  • Sell credit card info or identity on the dark web.
  • Destroy your credit.
  • Create a complete headache from hell for you.

Nobody needs this in his or her life. So what do you do?


NOTE on Wi-Fi and other devices.

By now, you probably have seen the video where a hacker takes control over a family's **** system (I am not giving them any advertising good or bad). The hacker (idiot) thinks it's funny to talk with the little girl, even telling the little girl, he is Santa Claus. Let's face it, that freaked us all out. Not to mention, making the entire family feel insecure in their own home. So here are some things you can do.


If you have a camera connected to your computer, unplug it when you're not using it. Cameras built into your laptop or other devices; change the settings to "Block." You can search Google on how to change settings for your specific device. Change your Wi-Fi password to 16 characters in length, for example, "d3ar-hacker-you-ar3-an-idiot". Also, if you have a password on your computer, change it. If you're going to update passwords, it's best to take the time to replace them all at once.

 online security google


Keep all your smartphones, computers, and other devices updated. Don't ignore software and hardware updates; updates are typically released with fixes for vulnerabilities and security issues.


Back to the 2-Step

First, create passwords that are at least eight characters (Wi-Fi – 16 characters), and include a capital letter, symbol, two numbers.

Second, start using 2-Step Verification or another second verification if available — this will add an extra layer of security to keep out the evil characters, even if they have your password.


What exactly is 2-Step Verification mean? How to use it?

Two-step verification is a process that involves two authentication methods performed one directly after the other to verify that someone or something is requesting access to a specific account. With most accounts, you will enter your password than a code is sent to your cell phone on file for that account.


Each code is unique and created for your account only when you require them. If you choose to utilize a 2-Step Verification code, the code will be sent to your phone via text, app, or voice call. Each code can only be used once and is valid for a short time.

When you sign in to Google or other accounts where you have turned on 2-Step Verification (some sites are implementing verification automatically), you'll enter your password. Then enter the code sent to you.


Keep sign-in simple:

During sign-in, you can choose not to use 2-Step Verification again on that specific device. After that, the computer will only ask for your password when you sign in. You will still be protected because when you or anyone else tries to sign in to your account from another device, 2-Step Verification will be required for a new device.


So now you have an extra layer of protection, at least until hackers figure a way around 2-Step and technology changes again.


Begin protecting your accounts immediately. It may take some time; however, it is better than that massive headache and your life in a horrifying tailspin!


It sucks, but over time, technology changes, and devices become outdated. Remember to keep your devices and software updated and change passwords every few months.

 Note: (Jan. 2021) Microsoft recently stated that you should use  Google Authenticator and not text message for 2FA.


Keep your information and life protected.

Triple Option Web Design & Digital Marketing


Below are the links for Google and other popular websites 2-Step Verification setup.

Google -

Facebook -

Twitter ­-

Instagram -

LinkedIn -

Read 1503 times Last modified on Sunday, 16 May 2021 09:34

Related items

  • Core Web Vitals & Page Experience FAQs | Discover Google SEO

    Core Web Vitals & Page Experience FAQs

     From: Google 12/2/20

    Q: What are the metrics? Why are they relevant to users?

    A: User-centric metrics are a critical tool in understanding, measuring and improving the user experience of your website. Largest Contentful Paint measures how quickly users see content. First Input Delay measures how responsive a site is to user input like tapping a button or entering data in a form. Cumulative Layout Shift measures how often elements of the page move around while the user is trying to read or interact with it.