Online security can be one of the last things you think about when youâre busy running your business or touring the world. In fact, chances are two-factor authentication and cyber security might be low on your priority list.
But hear us out.
Not taking care of your online security, especially not turning a two-factor authentication (2FA) method on, can have serious consequences.This can be from locking you out of your business accounts to commanding your payment profiles and even your credit and debit cards.
Hackers are getting smarter, and theyâre targeting users with weak security. Whatâs more, it takes mere seconds to put basic protections in place – for free.
74% of small businesses lack the capability and expertise to protect themselves from cyber attacks. This is a warning sign for us at TDS. We see so many business owners encounter some very typical pitfalls due to not taking care of basic security. Sadly for us, weâve seen many times the damage that online hacks can do, which is why we want to share this knowledge.
We hope that you can share this article with your friends and family, as it might just save them a lot of heartache too. Below we explore what two-factor authentication is, how to set it up, and what cyber criminals are really after.
What are hackers REALLY after?
The truth is, people who are stealing your data and money are not interested in your emails. Instead, once they get access to your email, they get the opportunity to access your various business accounts, like the ads platforms and the bank card details connected to them. Additionally, they can use and abuse this information the way they please and utilise your assets to spread malicious content. This is especially true if you have a large following that may be exploitable with a ransom.
Furthermore, if hackers get admin access to these platforms, they also have the authority to kick you and your collaborators out of the account. This means they are locking you out of your own platform. This whole process can be automated. It doesnât even require the hackers direct attention to do it en masse.Â
Why might YOU be the next victim?
Hackers rarely target specific people. Invariably, they choose those with weak security â the âlow hanging fruitâ.Â
Normally, when an account has a multi-factor authentication on, they tend to move on since itâs harder to hack. A lot of their automated systems are deflected by this simple barrier.
When you or your team members postpone turning the two-factor authentication on, you automatically become easy prey for hackers and scammers. Furthermore, itâs commonplace for people to reuse the same password for multiple websites, which only increases vulnerabilities to cyber attacks. In the eyes of a hacker: get the code for one; get the code for all (and donât think that adding a â!â at the end of your alternative password will help).
How does two factor authentication work?
The actual mechanism behind the two-factor-authentication is simple. Â
The concept of two factor authentication rests on the idea that you need to provide two identifying factors to prove your identity to gain access to your account. This helps to prevent unauthorised users from accessing your sensitive information or secure resources.Â
What can you do if your account information has already leaked?
You may have learned that not having two factor authentication turned on can cost you dearly, but what can you do if your data has already been compromised?
- Figure out what was stolen
Sometimes you get a notification that someone logged into your account. Other times hackers are creative and you might not know until you check your credit history.
If you receive a notification about a data breach associated with your account, make sure you read it carefully. Try to get an overview of what data has been stolen. You can also check if your email has leaked on this website.
- Change your passwords and consider a password manager
As an initial safety measure, you should immediately change the password.
If youâre thinking writing your passwords down on a piece of paper or an Excel document is a good idea, you should definitely reconsider. If hackers get access to this document, all of your login details and secret login codes will be up for grabs in a single spot. Instead, consider using a password manager service where you can store all of your and your clientsâ passwords and personal information.
- Set up two factor authentication
Setting up two factor authentication for your accounts is going to add an extra layer of security. We recommend staying away from text message two factor authentication where possible, as in general it is less secure. Instead itâs possible to install an app in order to generate a 2FA key.
How do you switch on two-factor authentication?Â
The specifics will vary from platform to platform, but the general solution will be to find the settings section of your account. Once there, you should see mention of an additional way to protect your account: 2 factor authentication. These can sometimes be called different things, but the concept is the same â someone now not only needs your password to access your account, but also an additional piece of information.
This additional information will typically be in the form of a code sent to your phone or an authenticator app you will be requested to download (âGoogle Authenticatorâ is a commonly used example).
How can an intermediary system, like 1Password, help organise passwords?
Password managers, such as OnePassword, operate like a filing system; allowing you to store various sections of information into âvaultsâ. These vaults can store not only passwords, but also forms, secure documents, credit cards etc.
With certain plans, it also enables you to allow specific users access to certain vaults. We cannot recommend enough just how valuable it is to have all of your sensitive information clearly organised â allowing you to track all of your passwords without needing to memorise them.
Protect your accounts now and click to spread awareness of 2FA