Two-factor authentication: what it is and why you should activate it now

Two-factor authentication2

Two-factor authentication: what it is and why you should activate it now. You've probably heard or read about this, and you probably have no idea how important it is for your security and privacy. In this article we will touch on the subject in a pleasant way and we will let you be the one to come to a conclusion.

These types of systems exists in more than one application and it makes a very clear sense, to protect your accounts. If you are still not very clear, stay until the end, here you will find the answers.

What is two-step authentication

Two-factor authentication3

Despite the current technological evolution, accounts and profiles on various platforms they keep being attacked by hackers. The intent of these has various reasons, including creating chaos, testing computer viruses, obtaining personal information, scamming or even selling to the highest bidder.

The truth exists a very nice method to increase security and it is known as two-step authentication. This, in addition to the traditional form of access, requires a second one that regularly slows down the attacker.

It basically consists of, in addition to the usual credentials, ask who logs in, codes or confirmations from media external to the device. This guarantees that if someone outside our environment and who does not have direct contact with the smartphone, can enter the account.

There are several methods of two-step authentication, but the most common is by requesting a temporary code. This can be sent by various means, such as SMS, WhatsApp or using external code generation applications.

This type of authentication, regularly, does not link directly to email, because this is one of the first points to be attacked. This means that one of the most vulnerable points is our email account.

Why you should enable two-factor authentication

Two-factor authentication4

As we saw earlier, our accounts are vulnerable to cyber attacks from third parties. The intent of having an additional authentication method is to make access more complex and prevent unauthorized incursion.

It is highly recommended activate this system in all accounts that allow it, mainly due to the current link between various social networks and platforms. For example, Instagram, Facebook and even WhatsApp are from the same network, the Meta company, these accounts share links that allow interaction between all of them.

The two-step authentication method it is not a 100% effective method, since there may be failures or even access by other means, but it significantly reduces unauthorized access.

The activation recommendation is issued even by the developers themselves, who seek make login methods more secure and reliable. This trend has increased positively in recent months, as hacking incidents also peaked in the same period, so users have protected themselves.

How to activate the two-step authentication method

Two-step authentication

As I mentioned before, this two-step authentication system, not exclusive to a particular appIt is even used on web platforms. If you want to activate this method to log in to various apps, I will explain step by step what to do.

You should keep in mind that for how valuable this process can be, it is very punctual and simple. There is nothing to fear, let's get started.

Activation in WhatsApp

The popular messaging app has been broadly focused on the privacy of its users. It has not neglected security, so it has various support elements. This time we focus on activation in two steps.

  1. Log in regularly in your application.
  2. Click on the three vertically aligned points in the upper right corner and then on “Settings". REM 1
  3. In the new menu, in which, by the way, you control everything related to your profile, you must click lightly on the option "Account”. This is found as the first upon entering.
  4. Here you will see a series of configurations based on security and privacy, the one of our interest at the moment, “Two step verification".
  5. Once inside, you must click on “Activate”. In my case, she already had it active and it cannot be seen in the image. REM2
  6. After activating, the system will ask to confirm your email and a 6 number PIN.

It is vital that you remember this key, as it can be requested by the platform at any time, even without trying to log in. My recommendation is that you do a Strong PIN without setting public datessuch as anniversaries or birthdays.

best mobile password managers
Related article:
Best mobile password managers

Activation on Instagram

Instagram, another of the highly popular social platforms of the Meta group. It has a two-step entry system, which allows you to manage even Facebook accounts.

Since their acquisition and unification, Facebook and Instagram have worked almost in parallel. A clear example of this is the content publication, planning and management system, that is, Meta Business Suite.

From Instagram you will be able to edit and modify the security of Facebook, which offers important advantages. The steps to follow to activate two-step authentication are as follows:

  1. Log in to the Instagram app as normal. In case you do not have an active session, you must enter your credentials.
  2. Go to your profile, to do this simply click on your profile image, located in the lower right corner of the screen.
  3. Once there, you will find three horizontal lines aligned in the upper right area of ​​the screen. Click on it to display a new list of options. Ins1
  4. At this moment we are interested in the first of the options, “Settings and privacy”, where we will press.
  5. Here, we will delve into the "Account center", The first option. It can be said that here we will manage all the Facebook and Instagram accounts linked to each other.
  6. Upon entering, we will see which are the linked profiles, but we will focus on the option “Password and security".
  7. On the new screen, among the first three options we will see “Two-step authentication”. Where should we click? Ins2
  8. It is essential that the method be applied individually, therefore, you must uniquely choose the account you want to configure.
  9. You will have to make a decision what will be the method to get the login codeThese range from SMS and WhatsApp to authentication apps.

Once we finish the configuration, it will be necessary to validate the method with the code sent, we save our account will be protected. You should also keep in mind that it may be necessary to enter your password to complete the configuration.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Actualidad Blog
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.