Small biz tip: How to set up an authenticator to protect your work accounts

Your business accounts have tons of private data you don’t want hackers to see. Although two-step verification (2FA) keeps hackers out, you can’t rely on texts to prove your identity. Hackers can intercept your messages.

Want to take security a step further? Use authenticator apps to secure your business. They create unique, time-sensitive codes you can immediately use to verify who you are and protect your accounts.

Apps like Microsoft Authenticator and Google Authenticator are more secure than 2FA texts. They’re free and highly effective against hackers. Use this guide to set up each tool on your iPhone or Android phone.

Here’s why you should use an authenticator app

Every 30 seconds, an authenticator app generates a one-time passcode you can use to sign in. But be quick. The code will expire in half a minute. Compare that to a text code, which gives hackers an extended time window to break into your account.

Plus, you don’t have to enter a phone number to set up an authenticator app. It’s unique to your device.

When you log into an account using 2FA with an authenticator app instead of a text, a unique code will be generated on the app. This is more secure than a text because the code can’t be intercepted. Tap or click for our guide to authenticator apps.

Which is better: Microsoft Authenticator vs. Google Authenticator? It all depends on what you’re looking for.

How to set up Microsoft Authenticator on an iPhone or Android

If you’re comfortable with Windows and Microsoft products, you may prefer this app. It secures Chrome, Gmail, GitHub, YouTube and other important accounts. As a bonus, it has a built-in password manager, which helps you access your accounts with one tap.

First, download the free app for your phone. It’s available for iOS and Android.

Continue reading

5 Amazon Fire TV security and privacy settings you need to change

Worried about hacking? You should be. Any device that connects to W-iFi, including smartphones, computers, tablets or any other smart tech, is susceptible to being compromised by cybercriminals.

You probably have a few safeguards in place to secure these devices, which will help cut down on potential compromises. But are you safeguarding all of the devices that you need to?

Continue reading

5 frightening phishing scams to watch out for

Phishing scams have been running rampant in recent weeks, all too often taking hundreds of thousands of innocent victims to the cleaners and leaving them red-faced and with little to no money left in the bank. In order to stay protected from these seriously scary scams, you need to know what to look for.

Continue reading