• Home
  • Privacy


Three Applications of Two-Factor Authentication

When it comes to simple security measures that everyone can take to protect their data, two-factor authentication is a must. The system sends users a secure code that only works for a short amount of time, and that code can be sent in many forms, including text, phone, and email. Once you’ve verified a device, you won’t need to do it again. But any other device that tries to log into your accounts will have another hurdle to jump through.

Here are three essential uses for two-factor authentication:

  1. Your Apple Account
  2. Go to Apple’s My Apple ID page and log in.
  3. In the Security section, click “Edit.”
  4. Switch the Two-Factor Authentication feature on.
  5. In this section of settings you should also add the phone number you’ll use for verification. Then select whether you want to receive codes via text message or automated phone call.

Your Microsoft Account

  1. Go to the Security basics page and sign in with your Microsoft account.
  2. Select more security options.
  3. Under Two-step verification, choose Set up two-step verification to turn it on, or choose Turn off two-step verification to turn it off.
  4. Follow the instructions.

Your Google Account

  1. Go to your Google Account.
  2. On the left navigation panel, click Security.
  3. On the Signing in to Google panel, click 2-Step Verification.
  4. Click Get started and complete each of the steps.
  5. Choose your second verification step. Select text message, call, or other.
  6. You can also set up a backup verification step, or another way to get into your account should you forget your password. In the 2-Step Verification step, select Get Started, Choose another option, and then add an alternative step.

You’ll save yourself from a lot of potential harm by adding another layer of security to these three profiles. If you’re interested in doing the same for other sites, we would definitely recommend it. This piece from Wired is a great primer for all things two-factor authentication.

The BIGtoken blog brings you tips on data privacy and how to best manage your data everywhere. Get ready to claim your data.