{"id":133,"date":"2020-07-05T12:38:55","date_gmt":"2020-07-05T12:38:55","guid":{"rendered":"http:\/\/noriskdomain.net\/blog\/?p=133"},"modified":"2020-10-08T16:01:33","modified_gmt":"2020-10-08T16:01:33","slug":"why-is-the-two-step-authentication-necessary","status":"publish","type":"post","link":"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/","title":{"rendered":"Why is the two-step authentication necessary?"},"content":{"rendered":"\n<p>Sometimes we hear from a friend or family member that someone has accessed their account and changed their password, preventing them from logging in. You could avoid this and any other kinds of situations if you activate the two-step verification.&nbsp;<\/p>\n\n\n\n<p>Two-step verification, also known as two-factor authentication (2FA), is a security measure that makes it more difficult for someone without authorization to access the personal account of a service that has this functionality.&nbsp;<\/p>\n\n\n\n<p>When we activate this type of verification on a web service, in addition to using the password, it will be necessary to provide another unique code to conclude the access.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/word-edit.officeapps.live.com\/we\/ResReader.ashx?v=00000000-0000-0000-0000-000000000014&amp;n=E2o1.img&amp;rndm=634373f3-7d15-4d5e-93b1-5ce961f5aa9e&amp;WOPIsrc=https%3A%2F%2Fwopi%2Eonedrive%2Ecom%2Fwopi%2Ffiles%2F3C29F7B23E0FCECF%211522&amp;access_token=4wJr1qlEYV7aAiEY7hBj8jM0hTFQG_UfkrA9iTNSBkEvPpdqZqXPtcHJBBDnCczHCwblZfJ4WFbJ37uxRwUgjxgaEw-__7LmItvL9qC6acAvFigXaNF6hVDE-zILHmOlH8MGdE7CPgNuePZlR4GQa9OtgJ8FyLL9J6vrfjCCTgMuT0orO0s0Dy7iPVUzzkG8LXSpNAo6iK8cw7p3BTDnohTQf9xeaqc8Ww5SnsYm9XUYb9_0KAlL1-1qRYIyr3MrkfWMgc0K2ZwVzlDrgTkF2B2d9akQk1bnUnF-ZEl-MR84jFfcfntB3KKiAkZpWERxihQ8HKyeofnBQoVQzhtERZHeYWqW_i4NXshe2CFYrGXL3hDLMGH7AxAjQ09lto4ouyFEmDGmFTP12v6GjALKyb7WtGARqm5yVXqaCe2fCOvVRmWQ3ew9kEcIKoXzw2RiMLQMJHsFoAhIII4DnL4dATIALRRxK8DjmaPlDAFcjw1-ZryvEeadvu50b8dphZf8aD&amp;access_token_ttl=1603370171440&amp;usid=a9ac007f-983f-4f21-8c13-f31fca38010f&amp;build=16.0.13329.41000&amp;waccluster=IE3\" alt=\"Motivos para activar la verificaci\u00f3n en dos pasos (2FA)en un servicio\" width=\"632\" height=\"302\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is it?<\/strong>&nbsp;<\/h3>\n\n\n\n<p>This method consists of reinforcing the usual password that you must enter to log in to any website, social network, or online application.&nbsp;<\/p>\n\n\n\n<p>With 2FA technology, in addition to that password, there is a second step that gives more security and prevents further unauthorized access.&nbsp;<\/p>\n\n\n\n<p>If you have the two-step verification enabled, when you login, after entering your password, you will be prompted for additional authentication, hence the &#8220;two-step&#8221; feature. To give this approval, you must have configured your telephone number, as you will receive a code via text message.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-4.png\" alt=\"Qu\u00e9 es y c\u00f3mo activar la verificaci\u00f3n en dos pasos en tus apps\" class=\"wp-image-134\" width=\"553\" height=\"361\" srcset=\"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-4.png 372w, https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-4-300x196.png 300w\" sizes=\"(max-width: 553px) 100vw, 553px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Why&nbsp;to&nbsp;use it?<\/strong>&nbsp;<\/h3>\n\n\n\n<p>It may be the case that someone gets hold of our password, for example, through a phishing attack.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In this case, if we don&#8217;t have two-step verification enabled, a cyber-crook could access our account and carry out any action that could have negative repercussions, as in the eyes of the rest of the people we would have done it ourselves.&nbsp;<\/p>\n\n\n\n<p>On the other hand, if two-step verification is enabled, the cyber-crook will not be able to access your account because, even if they have the password, they will not have the necessary code to complete the access process.&nbsp;<\/p>\n\n\n\n<p>Two-step verification can be the difference between being a victim of a cyber-criminal and not.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Some&nbsp;things&nbsp;to consider<\/strong>&nbsp;<\/h3>\n\n\n\n<p>The disadvantage of using this security measure is losing the device with which we receive the verification code. In that case, each service has its recovery mechanisms.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-5.png\" alt=\"Verificaci\u00f3n en dos pasos | Mantenimiento Inform\u00e1tico\" class=\"wp-image-135\" width=\"586\" height=\"318\" srcset=\"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-5.png 334w, https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/image-5-300x163.png 300w\" sizes=\"(max-width: 586px) 100vw, 586px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conclusion<\/strong>&nbsp;<\/h3>\n\n\n\n<p>This security measure helps reduce the chances of your account of getting compromised, but nothing is foolproof.&nbsp;&nbsp;<\/p>\n\n\n\n<p>There are other precautionary measures such as configuring your router securely, avoiding connecting to unfamiliar&nbsp;Wi-Fi&nbsp;networks, not clicking and leaving personal data on links that come to us through WhatsApp, Gmail, or some other service to obtain supposed benefits or to reconfigure passwords that we never ask you to reconfigure in the first place.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sometimes we hear from a friend or family member that someone has accessed their account and changed their password, preventing<\/p>\n","protected":false},"author":2,"featured_media":136,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why is the two-step authentication necessary? -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why is the two-step authentication necessary? -\" \/>\n<meta property=\"og:description\" content=\"Sometimes we hear from a friend or family member that someone has accessed their account and changed their password, preventing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-05T12:38:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-08T16:01:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/shutterstock_641960737.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anonymous\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anonymous\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/\",\"url\":\"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/\",\"name\":\"Why is the two-step authentication necessary? -\",\"isPartOf\":{\"@id\":\"https:\/\/noriskdomain.net\/blog\/#website\"},\"datePublished\":\"2020-07-05T12:38:55+00:00\",\"dateModified\":\"2020-10-08T16:01:33+00:00\",\"author\":{\"@id\":\"https:\/\/noriskdomain.net\/blog\/#\/schema\/person\/34bb9c735a14700672147fcc941d8b31\"},\"breadcrumb\":{\"@id\":\"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/noriskdomain.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why is the two-step authentication necessary?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/noriskdomain.net\/blog\/#website\",\"url\":\"https:\/\/noriskdomain.net\/blog\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/noriskdomain.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/noriskdomain.net\/blog\/#\/schema\/person\/34bb9c735a14700672147fcc941d8b31\",\"name\":\"Anonymous\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/noriskdomain.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/484383e83973b56f08179b2dbc70f98b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/484383e83973b56f08179b2dbc70f98b?s=96&d=mm&r=g\",\"caption\":\"Anonymous\"},\"url\":\"https:\/\/noriskdomain.net\/blog\/author\/anonymous\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why is the two-step authentication necessary? -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/","og_locale":"en_US","og_type":"article","og_title":"Why is the two-step authentication necessary? -","og_description":"Sometimes we hear from a friend or family member that someone has accessed their account and changed their password, preventing","og_url":"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/","article_published_time":"2020-07-05T12:38:55+00:00","article_modified_time":"2020-10-08T16:01:33+00:00","og_image":[{"width":1000,"height":636,"url":"https:\/\/noriskdomain.net\/blog\/wp-content\/uploads\/2020\/10\/shutterstock_641960737.jpg","type":"image\/jpeg"}],"author":"Anonymous","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anonymous","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/","url":"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/","name":"Why is the two-step authentication necessary? -","isPartOf":{"@id":"https:\/\/noriskdomain.net\/blog\/#website"},"datePublished":"2020-07-05T12:38:55+00:00","dateModified":"2020-10-08T16:01:33+00:00","author":{"@id":"https:\/\/noriskdomain.net\/blog\/#\/schema\/person\/34bb9c735a14700672147fcc941d8b31"},"breadcrumb":{"@id":"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/noriskdomain.net\/blog\/why-is-the-two-step-authentication-necessary\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/noriskdomain.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Why is the two-step authentication necessary?"}]},{"@type":"WebSite","@id":"https:\/\/noriskdomain.net\/blog\/#website","url":"https:\/\/noriskdomain.net\/blog\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/noriskdomain.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/noriskdomain.net\/blog\/#\/schema\/person\/34bb9c735a14700672147fcc941d8b31","name":"Anonymous","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/noriskdomain.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/484383e83973b56f08179b2dbc70f98b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/484383e83973b56f08179b2dbc70f98b?s=96&d=mm&r=g","caption":"Anonymous"},"url":"https:\/\/noriskdomain.net\/blog\/author\/anonymous\/"}]}},"_links":{"self":[{"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/posts\/133"}],"collection":[{"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":2,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/posts\/133\/revisions"}],"predecessor-version":[{"id":146,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/posts\/133\/revisions\/146"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/media\/136"}],"wp:attachment":[{"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/media?parent=133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/categories?post=133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/noriskdomain.net\/blog\/wp-json\/wp\/v2\/tags?post=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}