Skip to main content

Internet Security: Ask questions about 2-Step Verification

By October 26, 2015#!28Thu, 28 Feb 2019 10:46:33 -0300p3328#28Thu, 28 Feb 2019 10:46:33 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28 28am28am-28Thu, 28 Feb 2019 10:46:33 -0300p10America/Sao_Paulo2828America/Sao_Paulox282019Thu, 28 Feb 2019 10:46:33 -03004610462amThursday=904#!28Thu, 28 Feb 2019 10:46:33 -0300pAmerica/Sao_Paulo2#February 28th, 2019#!28Thu, 28 Feb 2019 10:46:33 -0300p3328#/28Thu, 28 Feb 2019 10:46:33 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28#!28Thu, 28 Feb 2019 10:46:33 -0300pAmerica/Sao_Paulo2#No Comments

vulnerabilidades (Center for Studies, Response and Treatment of Incidents of Internet security in Brazil) has provided a booklet that explains the process of 2-step verification or authentication. The chapter is part of the Internet Security Primer.

The most common types of the procedure are verification codes, which may or may not be specific; the password generator token; the security card; the reliable device; the backup / reserve code list and recovery key. Each is described in the new issue, which also explains the care the user must take when using each one.

Although widely used for site authentication, passwords are not always secure enough to guarantee user identity. “Cases like the invasion of Hollywood celebrity accounts that had their privacy exposed and attacks on Twitter profiles of major media outlets could have been avoided if two-step verification had been used,” explains Miriam Von Zuben, analyst security center.

To make your password secure, Miriam highlights combinations you should avoid: any kind of personal data, keyboard strings, and words that are on publicly known lists such as song names and football teams. Random numbers, a large number of characters, and different types of characters, on the other hand, can contribute to less vulnerable code.

Internet Security Primer is available on here.

In addition to “2-Step Verification,” the archive features issues about accounts and passwords, malicious code, internet banking, mobile devices, privacy on social networks, and more.

Source: Digital Look

Want to learn more about authentication with RSA tokens? 

Contact us: [email protected]

Leave a Reply