Sometimes called Two factor verification. This provides multiple methods to verify yourself in addition to your usual login user and password which vastly improves your security while using online apps and websites. MFA apps are the recommended approach as the Common approaches of SMS or email codes could be spoofed or hacked.
MFA – Multi-factor authentication
- Ente Auth
- DELETE Authy Has become problematic since bought out by Twillio
- DELETE Google Authenticator We don't trust Google
Last updated: September 9th, 2024
MFA – Multi-factor authentication by actionskills.co is licensed under a Creative Commons Attribution 4.0 International License.
https://actionskills.au/resource/2fa-two-factor-authentication/.
- Ten quick and easy things to radically improve your digital privacy and security
- Please Note
- Webinar discussing this content and tools
- Why Secure myself? – I am not doing anything worth spying on
- Why Bother, they can access all my data anyway?
- Who are we protecting from?
- Herd Immunity – My part in protecting everyone
- Don’t let Paranoia stop you organising
- Convenience VS Security
- Be geek street-smart – Security is not perfect
- Digital literacy – learn your technology
- Encryption works – What is encryption?
- Encrypt all devices, drives and sensitive folders
- Multiple backups
- Update your software regular – apply updates
- Lock your computer and phones. Review security settings
- Phone security
- Secure Phone communications
- Smart password mangement
- Antivirus and scanners
- Location and tracking
- MFA – Multi-factor authentication
- Private Internet – Stop using Google and FaceBook (so much)
- Private Internet – Block ads and trackers
- Private Internet – VPN – Virtual private network
- Private Internet – Tor – Anonymous Browsing
- Private Internet – Anonymous Connection
- Private internet – commerce
- Advanced anonymous internet
- Security Culture – working in groups
- Remote Group collaboration – working online
- Document Collaboration
- Secure Email
- Group Chat
- Video conferencing
- Phones and laptops in meetings
- Databases and CRMs
- Email list management
- Secure PC Operating System
- More digital security guides