Why you need to enable Apple's 2-Step VerificationJohn Biglin, CEO | March 24, 2013
Apple has finally added Two-Factor Authentication capability to Apple IDs to protect your account from hackers who attempt to gain access to your iCloud account, your iDevices (via the Find my iDevice feature) and other risks.
This has been something that is missing from Apple’s account security while many other competing systems and services have offered it for years. Without it, your Apple accounts and your devices, including MacBook laptops, are at risk from a fairly simple security hack.
I would highly recommend enabling two-factor authentication to anyone who uses a system capable of this feature.
Two-Factor Authentication is an easy way to secure your accounts and essentially makes it so you log-in to your accounts with two things: “something you know” (your password), and “something you have immediate access to,” (Text Messages, in this case). Apple calls their version “Two-Step Verification”.
Here is how to set it up on an Apple ID:
in toyour AppleID (http://appleid.apple.com )
- Select “Password and Security”. You will be prompted to enter the answers to your security questions.
- Under “Two-Step Verification,” select “Get Started” and follow the instructions as displayed.
The screen will show your registered devices. You should see the devices you are using. If not, enable “Find My iPhone” on your device (Settings > iCloud). Click “Verify” and the system will send you a four digit number, which you will need to enter via the website’s setup process.
In the next
Confirm your recovery key by retyping it when prompted, and then click “Enable Two-Step Verification.”
Once Two-Factor Authentication is set up, Apple will send you a four-digit code each time you attempt to make purchases in the App Store, iTunes, iBookstore or access your account with an unrecognized device. Even if someone guesses your password, unless they have your device with them, they would not be able to easily guess the four-digit code, which is only valid for a short period of time, by the way.
It is an extra step (no pun intended) in that you will have to enter both your password and the four-digit code when accessing your account for purchases or security changes, but it is well worth another layer of protection.
If you have questions on setting it up, check out Apple’s support page: support.apple.com/kb/HT5570
Also, check out this sad story that shows precisely why Two-Factor Authentication is so necessary: (It could happen to anyone)
Interphase Systems can help protect your firm. We know IT™.
Contact us today! firstname.lastname@example.org – 610-276-5500 Option 2.
Share this important tip with your colleagues.
At the Alcoa plant in the distant coastal town of Fjardaal, Iceland, employees relied on a magnetic board to assign and trade shifts, while standard email was used to communicate critical information from one shift to the next--both of which required people to be...
Did you know that technology is helping to protect and save our oceans? With #cloud security and communication tools, @JacksDiveLocker has exponentially increased their outreach and education efforts to keep our oceans healthy and thriving.
Want to see how the latest #security tools can help grow your business? Contact the Client Engagement team at Interphase Systems (email@example.com or 610-276-5500) to get started today!
Communication among team members and between different teams, especially when they’re in different locations, can be a huge challenge–but it doesn’t have to be an obstacle to collaboration and teamwork. Watch this video to discover why Red Lion Hotels (RLH) trusted Microsoft Teams to integrate all its corporate collaboration needs into one internal communications tool. Interphase Systems helps organizations of all types build and implement a collaboration strategy that leverages Microsoft Teams as the nexus for internal and external team collaboration. Contact our Client Engagement team today (firstname.lastname@example.org or 610-276-5500) to help your organization plan and implement its own collaboration strategy.
One of the most popular questions that I receive, as it pertains to Office 365, is as follows: "When should I use Teams, Yammer and Skype for Business? Their functions seem to crossover." Many people have provided their insights in an effort to...
Are you ready to lose all your money, cancel all accounts, and probably experience a system failure? I’m sure you will never be ready for that, which is why it’s critical you recognize the anatomy of a phishing email to avoid becoming a victim. So here are several...
Password managers do more for you than just help you remember which password you used for different accounts. In this post, I am going to dig a little deeper into explaining what password managers do and how can they benefit your personal security and privacy. A...