Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,153,427 members, 7,819,554 topics. Date: Monday, 06 May 2024 at 06:03 PM

How To Protect Your Internet Accounts, Here’s How To Do It. - Phones - Nairaland

Nairaland Forum / Science/Technology / Phones / How To Protect Your Internet Accounts, Here’s How To Do It. (342 Views)

How Fast Is Your Internet? / Letter To Glo: Why Is Your Internet Not Loading Many Important Websites?? / Whatsapp Verified Accounts: Here Are A Few Things To Know (2) (3) (4)

(1) (Reply)

How To Protect Your Internet Accounts, Here’s How To Do It. by Mrwealth933: 9:10am On Mar 30, 2019
Written by Freelancing Writer and Editor : Olayinka Sodiq

Last week Facebook revealed that it had stored millions of people’s account passwords in an insecure format, the importance of security settings that majority neglect to use became vivid: The two-factor authentication.

Well, that sounds a mouthful, but it is essential for our digital protection. It stands for is two steps verification that ensures you are who you say you are, so in cases of your password falling into the wrong hands, they simply cannot pretend to be you.

Here’s how two-factor authentication generally works: for instance; you enter your user name and password to get into your online bank account. That’s step one. The bank then sends a text message to your phone with a temporary code that is required before the site lets you log in. That’s step two. In this way, you prove your identity by having access to your phone and that code.

It’s amazing how simple and safer it sounds, yet barely anyone uses it. According to research by Google, fewer than 10 percent of its users have signed up for two-factor authentication to protect their Google accounts for services including email, photos, and calendars. Guemmy Kim, Google’s head of account security said “It’s really hard to get a user to sign up,” “It sounds cumbersome.”

Well, In reality, it isn’t that complicated. And in recent years, the technique has evolved to become more secure and, in some cases, even easier to use, in addition to receiving text messages, you can now log in by using codes shown in an app, by setting up your phone to receive a notification and hitting a button or installing in a physical security key.

Using just one or two of these methods will go a long way toward preventing an inappropriate person, like a jealous ex or a hacker, from getting access to your account.



So here’s a guide to four ways of setting up two-factor authentication on some of the most popular sites — and the pros and cons of each method.

How to Securing your Instagram account with text-messaged codes
Start by setting up your Instagram account with traditional two-factor authentication using text messages is the most common verification technique across apps and websites, although it has some of the biggest vulnerabilities.

Here’s what to do:

Inside your Instagram app, open settings, then tap privacy and security and select two-factor authentication.
Enter your phone number. You will receive a text message containing a six-digit code. Enter the code.
From now on, whenever you log in to your Instagram account, you will receive a text message containing a temporary code which is required before you log in.
Pros: A simple and easy method: there is no need to install any additional apps on your phone to receive texts. And if you lose your device or switch to a new phone, you can still receive your login codes as long as you have the same phone number.

Cons: Phone numbers and text messages are susceptible to phishing or hijacking by hackers (though this is unlikely to happen unless you are a high-profile target such as a well-known activist). If you travel abroad, receiving text messages on a foreign carrier can be pricey. And there are security risks in receiving texts on foreign networks in countries with heavy surveillance such as China and Russia or some other improved countries.

How to set up an app to authenticate your Facebook account
Receiving a temporary code via an authenticator app is another way to start two-factor authentication. For this example, let’s protect your Facebook account with such an app.

Open your app store and download a free authenticator app, like Google Authenticatoror Authy.
Then on Facebook’s website, go to your security and login settings. Click “use two-factor authentication,” then “get started.” After re-entering your password, choose the authentication app as your security method. From here, follow the onscreen instructions.
From now on, whenever you log in to Facebook, you can open the authenticator app and look at the temporary six-digit code generated for your Facebook account. You must enter this code before being able to log in.
Pros: You do not need internet or a cellphone connection to receive a code via an authentication app. Most important, a hijacker can’t easily steal your codes from an authenticator app.

Cons: If you lose your phone or switch to a new one, you have to regain access to your account through a recovery method such as entering a backup code or asking the app provider to reset your account. That can be time-consuming.

Setting up Google Prompt on Google Mail
Google Prompt is a relatively new authentication feature for securing Google accounts. Instead of receiving a text message with a code, you receive a notification through a Google app asking whether the person trying to sign in is you. Hitting “Yes” logs you in.

Here are the steps:

Go to Gmail.com, go to your account settings and click “security.” Click 2-Step Verification, and then click Add Google Prompt.
Click Get Started and select your smartphone.
On your phone, open the Google or Gmail app. Google will show a device trying to log in to your account. Tap yes on the prompt.
From now on, whenever you log in to your Gmail account, the Gmail or Google app will ask whether the person seeking access is you. Hitting Yes will log you in.
Pros: It’s easy. Receiving a notification requires only an internet connection. Selecting yes is faster than typing in a code.

Cons: Not all apps and sites have a prompt-based verification method, meaning your banking site, for example, may still text you a temporary code. If your internet connection is spotty, you may also have a difficult time receiving the prompt.

Securing your Twitter account with a physical key
Lastly, let’s go through the most physical two-factor authentication method, which involves plugging in a key. Google was one of the first to introduce a security key program in 2017, and many websites, including Twitter and Facebook, have since adopted the method.

Here’s how to secure a Twitter account with a security key:

Buy a security key, such as Google’s $50 Titan security key bundle.
On Twitter’s website, go to your account settings and click “Set up login verification.” Enter your phone number, and then punch in the code you receive via text message.
In “Security key,” click set up. Insert the security key into a USB port, and press the button on the key. Press the button again to verify the key.
The next time you log in to Twitter, click “Choose different verification method” and select “Use your security key.” After plugging the key into your computer, you will be able to log in.
Pros: For people who are extra paranoid about being phished or hacked, this is one of the most secure authentication methods because of the physical access to your key for logging in.

Cons: The keys to cost money. What’s more, some sites require you to insert the key every time, so if you forget to carry your key, logging in with a backup method can be complicated. And not all web browsers support logging in with security keys.

This presentation is protected by the U.S. and international copyright laws, Reproduction or distribution of this presentation without written permission of the sponsor is Highly Prohibited.

https://mornewsonline.com/2019/03/30/how-to-protect-your-internet-accounts-heres-how-to-do-it/

1 Share

(1) (Reply)

How To Download, Manage, And Update Apps And Games On The Google Play Store / How To Backup And Restore App Data With Or Without Root / Am In Urgent Need Of A Universal 4G Mifi.. Lagos, Ibadan Or Abeokuta Axis

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 21
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.