Contact us:

(916) 209-0134 | suncitycomputersolutions@gmail.com |Like us on Facebook! | Check us out on Yelp! | We have a new website!

Thursday, February 9, 2017

Understanding the basics of two-factor authentication

     Two-factor authentication (2FA) is the least complex version of multi-factor authorization (MFA) and was invented to add an extra layer of security to the – now considered old-fashioned and insecure – simple login procedure using a username and a password. Given the number of leaked login credentials for various websites (Yahoo, LinkedIn, Twitter to name a few), this extra layer is very much needed. One of the most well-known examples will occur when you try to login on a site from a different machine or from a different location (resulting in a different IP). With 2FA-enabled login procedures, you may receive a text message providing you with a verification code. That code is needed to complete the login procedure.

Wi-Fi Security: 101

     For anyone that travels, uses their phone in public, or stays constantly connected to the internet anywhere they go—which probably means you, Wi-Fi security should be a top priority. This day and age, we use wireless internet connection anywhere we can find, but often times, don’t think about the dangers of jumping on a public network and getting hacked. The term “hack” and “data breach” seem to be more common than ever, in the news and media—and there’s a reason for that. The increase of mobile device usage and connected technologies everywhere have been a blessing and a new curse because it has indirectly made your information and devices more susceptible. Here’s the 101 on Wi-Fi security and what you can do to keep the personal information stored on your mobile devices, well, personal.