![]() If you don’t have access to that second code, then you’re not getting in. With two-factor authentication set up, once you’ve entered your password – the first factor of authentication – you’ll be sent a four or six digit code to enter as well – the second factor of authentication. ![]() You could also use a third-party service such as Facebook or Google to sign into other apps and services – a more convenient solution, but then, of course, you’re giving Facebook and Google, or whoever, an even greater idea of your browsing and spending habits.Ī more practical option is to use a password manager, an app which stores and encrypts login details for every service you use behind a single, strong master password. If it’s stolen, then, well, you’ve just given whoever’s stolen it a veritable goldmine of information. You could in theory take that notebook with you, but, of course, if you lose your notebook, then you’ve got to reset passwords for everything and start again. That, obviously, isn’t convenient for times when you’re out and about. You could come up with strong and unique passwords for everything that requires one, and maybe even write those down on a piece of paper, or in a notebook, and keep that somewhere safe. Maintaining separate passwords for each and every account you use is a drag, not to mention impractical. One way people can get to your personal information is by guessing your passwords and logging into accounts that contain that information. Here are the main ones you should know about – and put into action! 1. Being lax about privacy and security online means you could inadvertently arm just about anyone with information about your interests and whereabouts, from that person who used to terrorise you at school who now keeps trying to add you on Facebook, to a vindictive ex-partner, or that awful fleeting acquaintance who keeps trying to get you to endorse them on LinkedIn (if you’re reading this, please leave me alone).įortunately there are more than a few tools at your disposal to help better protect your online identity, as well as adopting some best practices and taking proactive steps. ![]() And it isn’t just fraudsters who might be after your information.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |