Two-Step Validation
Miscellanea / / July 04, 2021
By Guillem Alsina González, in Oct. 2018
When we use our password to identify ourselves in, for example, our account email, we run a risk: that, if intercepted, someone could enter as if they had our house key in their pocket.
To do this, what is done is to introduce a second way of identifying ourselves, giving way to what is called "ID double factor ”or in two steps.
Two-factor identification consists of authenticating in two different and unrelated ways to log into online services. The most common way is using the mobile phone
This is because the mobile It is, today, the most widespread personal device in the world, and it is done by SMS, since it is the only message common to both feature phones and smartphones.
To understand it, let's take a practical example: access our email account. Once given our name of Username and password, the system warns us that you have sent us an SMS message to the mobile with a code numerical, and that we must introduce this code.
In this way, we have used two different elements such as the username and password that we have memorized, and a code generated at the moment it reaches one of our devices mobiles.
But how exactly does this protect us? Well, if before, a cybercriminal only needed to have access to our username and password to take control of our account, now you must also have our mobile.
You can think “and that? you can steal it from us, or clone it”And that is relatively easy, indeed, but not so much if we are talking about a cybercriminal who lives in another part of the world, for example.
Another advantage of a two-step authentication or validation system is that if someone tries to validate from a device that is not one of those commonly used, the The system will immediately send an SMS message to our mobile with a code, which we have not requested, so we can see that we are experiencing an attempt to cyber-aggression.
”This is fine, so what do I need to activate it?”Well, each service is different, and in each one there is a different way of doing it.
The best thing is that, if we want to activate this two-step verification system in our email, file service in the cloud (cloud) or another, we turn to the help of the service, since in each one it is done in a different way.
The main online services already have this tool, which is considered much safer than traditional form of validation "to dry".
Photos: Fotolia - absent84 / golubovy
Topics in Two-Step Validation