Same Day Onsite for Kent, London, Sussex, Surrey, Hampshire and Essex
Remote Support throughout UK and International
Pickup and Collect Hardware Repair Service Available throughout the UK
Our main offices are located in Hove, East Sussex
Address: 136 -140 Old Shoreham Road, Hove, East Sussex, BN3 7BD
Phone: 01273 248871
Email: support@dolphinupgrades.com
Copyright 2023 © Dolphin Computer Upgrades LTD all rights reserved.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | We only use cookies for analytic purposes - no other information is stored |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
You may have come across advice to setup two-factor authentication (2FA) on some of the websites or software that you login to. But what is? And when should you use it?
At its simplest, 2FA is the process required to access something by using two separate methods. It enables a higher level of security than just adding a username and password to a site, relying upon a second factor, usually either a security token or a biometric action.
How Does It Work?
When you reach the login screen, you will pop in your username and password, as you would ordinarily. Once this has been recognised, you are prompted to implement the second stage. This step can take several forms; you may have to prove something only you would have, such as a security token, ID card, smartphone or other mobile device. You then enter your one-time code that was generated and voila – you are authenticated and granted access to the application or website.
Where Would I Use 2FA?
In a business environment, 2FA should be set up for anyone to access company sensitive data – this could be shared drives, backups, or the accounting software. For personal use, 2FA can be enabled on any setup where you would be devastated if someone else, someone unwanted, had gained access. An example here would be your social media accounts.
2FA does not guarantee you won’t get hacked – but it does give you another level of defence. The more steps that you implement to access data the harder it is for those you don’t want to access it to do so. Given that passwords are often easy to guess, adding that next level of security means decreasing the chances that it will be you who is hacked.
Recent Posts
Popular Post
Top 10 Challenges Home Computer Users Face
September 22, 2023The Top 10 IT Security Concerns for
September 15, 20235 Things a Data Recovery Specialist Can
September 8, 2023Popular Categories
Popular Tags
Archives