Tip of the Week: Set Up 2-Step Verification for Your Google Account

b2ap3_thumbnail_googles_two_factor_authentication_400.jpgToday’s headlines are dominated by stories of major companies getting hacked, making the average computer user feel uneasy about their security. If you’re solely dependent on a measly password to protect you from hackers, then you’ve got good reason to worry. Adding a second layer of verification is an easy way to protect your information. Here’s how to set up 2-Step Verification for your Google account.

Keep in mind that most online accounts offer a two-factor authentication too, and as is the case with Google, setting up this extra security measure is easy to do.

How Google 2-Step Verification Works
Google’s 2-Step Verification security feature works by signing in to Google using your password, as you normally would. Before you’re given access to your account, Google will send your phone a temporary security code, via an SMS message, voice call, or mobile app that will complete the login process. Google also gives you the option to have your second step be a Security Key that you insert into your computer’s USB port.

The advantage of using 2-Step Verification is that a user will need to have a physical piece of hardware, like your smartphone or USB Security Key, in order to log in. This makes it much more difficult for your account to be hacked because the hacker needs both your password and your phone, which effectively eliminates everybody outside of the people you’re in immediate contact with.

How to Get Set Up with 2-Step Verification
Getting set up with Google’s 2-Step account is as easy as logging into your Google account and then going to this URL:

Click on Start setup >> and Google will walk you through the rest. This will include giving Google your phone number so they can send you an SMS message every time you sign in. Be sure to have your phone handy before clicking on the Start setup icon.

It’s important to keep in mind that Google's 2-Step Verification isn’t limited to SMS messages. When setting up this security feature, you will be presented with the option to use your landline phone number to retrieve your second step login code via an automated phone call from Google. Additionally, if you plan on using your Google account while traveling, you can print off a set of one-time-use codes from the account security page.

Remember that other online accounts offer two-factor authentication as well. To achieve the highest online security possible for your accounts, we highly recommend that you take advantage of this security feature everywhere that it’s offered. If you would like help setting up your company with two-factor authentication for its online accounts, as well as setting up other network security solutions that pull the rug out from underneath the hackers, give White Mountain IT Services a call at 603-889-0800.

Related Articles

  • Tip of the Week: How to Spot a Scam What would you do if you sat down at your desk one morning, coffee still kicking in, to discover a pop-up message on your computer announcing that Microsoft has detected a fatal issue with your workstation, and if they aren’t allowed to remote in and fix it, the entire network could be at risk? Woul...
  • Is It Safe to Have Your Browser Remember Your Passwords? Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you. Nope! While yes, the fact that we no longer ha...
  • Tip of the Week: Awareness Is Important When Surfing the Web We all love the Internet. We all use it almost every day. For this week’s tip, we’ll review a few ways to help keep yourself from getting in trouble while browsing. Sacrificing Security for ConvenienceFor starters, most of the threats to be found online are of the sort that can be avoided somewha...
  • 3 Ways Email Encryption Keeps Your Messages Safe Encryption is a very important tool in today’s business environment, especially if you are trying to protect your email communications. Today, we’ll discuss the benefits of using encryption for your business’ communications solutions, but without an understanding of what encryption actually is, the ...
  • Google’s Making Changes to Chrome, and Not Everyone’s Happy Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming ...
  • Could You Spot a Social Engineering Attack? As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will review later. If your business and its ...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.



White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064


 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions