Blog

Tip of the Week: Set Up 2-Step Verification for Your Google Account

b2ap3_thumbnail_googles_two_factor_authentication_400.jpgToday’s headlines are dominated by stories of major companies getting hacked, making the average computer user feel uneasy about their security. If you’re solely dependent on a measly password to protect you from hackers, then you’ve got good reason to worry. Adding a second layer of verification is an easy way to protect your information. Here’s how to set up 2-Step Verification for your Google account.

Keep in mind that most online accounts offer a two-factor authentication too, and as is the case with Google, setting up this extra security measure is easy to do.

How Google 2-Step Verification Works
Google’s 2-Step Verification security feature works by signing in to Google using your password, as you normally would. Before you’re given access to your account, Google will send your phone a temporary security code, via an SMS message, voice call, or mobile app that will complete the login process. Google also gives you the option to have your second step be a Security Key that you insert into your computer’s USB port.

The advantage of using 2-Step Verification is that a user will need to have a physical piece of hardware, like your smartphone or USB Security Key, in order to log in. This makes it much more difficult for your account to be hacked because the hacker needs both your password and your phone, which effectively eliminates everybody outside of the people you’re in immediate contact with.

How to Get Set Up with 2-Step Verification
Getting set up with Google’s 2-Step account is as easy as logging into your Google account and then going to this URL: https://accounts.google.com/SmsAuthConfig

Click on Start setup >> and Google will walk you through the rest. This will include giving Google your phone number so they can send you an SMS message every time you sign in. Be sure to have your phone handy before clicking on the Start setup icon.

It’s important to keep in mind that Google's 2-Step Verification isn’t limited to SMS messages. When setting up this security feature, you will be presented with the option to use your landline phone number to retrieve your second step login code via an automated phone call from Google. Additionally, if you plan on using your Google account while traveling, you can print off a set of one-time-use codes from the account security page.

Remember that other online accounts offer two-factor authentication as well. To achieve the highest online security possible for your accounts, we highly recommend that you take advantage of this security feature everywhere that it’s offered. If you would like help setting up your company with two-factor authentication for its online accounts, as well as setting up other network security solutions that pull the rug out from underneath the hackers, give White Mountain IT Services a call at 603-889-0800.

By accepting you will be accessing a service provided by a third-party external to https://www.whitemtn.com/

Related Posts

Your company’s email is one of its most important pieces of technology, and since that is true for nearly every business, it is unfortunately one of the most utilized attack vectors used by cybercriminals. Most businesses don’t understand just how vu...
Due to the increasing complexity and rapid growth of the cybersecurity industry, businesses need to stay ahead of developing threats designed to undermine advancements in the latest and greatest security technologies. One way that researchers have us...
With many people continuing to work remotely to some extent, it would be irresponsible not to acknowledge that remote work can introduce a level of risk to an organization’s cybersecurity. This makes it all the more important that this security is lo...
The cloud is far and away one of the most beneficial technologies that a modern business has at its disposal. Unfortunately, the same can be said for modern cybercriminals. The cloud has given cybercriminals new opportunities that are important to ac...
While protecting the credit card data you collect from your customers and clients is obviously important, you likely also have a line of credit for your business’ use that you need to think about as well. Let’s turn our focus to that card for a momen...
Passwords have been a primary data security measure since 1960, when MIT researcher Fernando Corbató suggested the practice—although even he is reportedly slow to take full credit. Why? Well, if you ask Corbató (and his contemporaries, who were the f...
Google Workspace is a great tool that allows you to get a lot done, but sometimes you might find yourself in a position where you need to download the files and take them with you or send them to someone. In these cases, you might not want to share t...
There are many different varieties of cybercrime that businesses need to be vigilant about. However, most of these varieties can largely be avoided through a few basic practices and behaviors. Here, we’re giving you a few tips to help you prevent att...

Ransomware has been commonplace for years, with no sign of it going anywhere anytime soon. Let’s take a few moments to examine the state of ransomware right now, and review how to keep it from impacting your businesses.

When we talk about data privacy in a business, the default is to generally think about the data the business has collected and compiled from its clientele. However, that’s just one type of data a business has. There’s also a lot of data that is colle...
Gauging the effectiveness of your cybersecurity can be a bit of a daunting task, especially when asking if it could make a major difference in protecting your organization’s network infrastructure. If you want to track and measure your business’ cybe...
More workplaces than ever before are utilizing the power of remote technology, but this also creates problems with security that must be addressed. How can you ensure that your organization isn’t putting itself at risk as a result of this general dis...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our offices in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 60 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

White Mountain IT Services


33 Main Street, Suite 302
Nashua, NH 03064

 


121 Riverfront Drive
Manchester, NH 03102

603-889-0800

Open Positions