{"id":1247,"date":"2016-11-08T05:28:50","date_gmt":"2016-11-08T13:28:50","guid":{"rendered":"http:\/\/computertechsreno.com\/tips\/?p=1247"},"modified":"2023-12-18T07:29:22","modified_gmt":"2023-12-18T15:29:22","slug":"secure-your-email-account-with-2step-verification","status":"publish","type":"post","link":"https:\/\/computertechsreno.com\/tips\/secure-your-email-account-with-2step-verification\/","title":{"rendered":"Secure your email account with 2-step verification"},"content":{"rendered":"<p><em>Updated 11\/8\/2016:<\/em><\/p>\n<p>With <a href=\"http:\/\/computertechsreno.com\/tips\/2011\/11\/email-hacking-on-the-rise-what-you-need-to-do-to-stay-safe\/\" target=\"_blank\" rel=\"noopener noreferrer\">email account hacking being a common\u00a0occurrence<\/a>, email providers Google, Yahoo and others introduced a 2-step verification process that can keep unwanted people from accessing your email account, or help you regain access to it in the event of a forgotten password or if it has been taken over by a hacker.<\/p>\n<p>It is important to note that you must setup 2-step verification for your account before hackers have a chance to do it first &#8211; and potentially lock you out of your account. Computer Techs recommends that you set-up 2-step verification now, as a pro-active preventative measure to keep hackers from accessing and\/or taking over your email account.<\/p>\n<p>2-step verification, (also known as 2-factor or multi-factor authentication) requires that anyone accessing your online account have 2 pieces of information in order to prove legitimate access:<\/p>\n<ul>\n<li>Something the user knows (e.g., password, security answer, PIN)<\/li>\n<li>Something the user physically has (e.g., phone, smartphone displaying a randomly\u00a0generated\u00a0code, ATM card)<\/li>\n<\/ul>\n<p>If you are unsure about setting up 2-step verification, please contact us and we will set it up for you. If you&#8217;d prefer to do it on your own, see the links below for instructions for the most popular email services.<\/p>\n<p>\u2022\u00a0Google\/Gmail: \u00a0If you use Gmail on your iPhone, an email program on your computer, or certain other 3rd-party applications that access your Google\/Gmail account, you will need to generate a one-time application-specific password in your Google account settings page\u00a0for each device or application. Please read the information and watch the video <a title=\"Click to view the external website\" href=\"http:\/\/support.google.com\/accounts\/bin\/answer.py?hl=en&amp;answer=185833&amp;topic=2784804&amp;ctx=topic\" target=\"_blank\" rel=\"noopener noreferrer\">Sign in using application-specific passwords<\/a>\u00a0before proceeding. You can then follow the instructions at\u00a0<a href=\"https:\/\/support.google.com\/accounts\/topic\/28786\" target=\"_blank\" rel=\"noopener noreferrer\">Getting started with 2-step verification<\/a>.<\/p>\n<p>\u2022 Outlook Mail\/Hotmail: See this <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/12408\/microsoft-account-about-two-step-verification\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft support article<\/a> to setup two-step verification, or\u00a0<a title=\"Click here to view the external website\" href=\"http:\/\/blogs.technet.com\/b\/microsoft_blog\/archive\/2013\/04\/17\/microsoft-account-gets-more-secure.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">this blog post<\/a> for more information.<\/p>\n<p>\u2022 AOL: See AOL&#8217;s information about <a href=\"https:\/\/help.aol.com\/articles\/2-step-verification-stronger-than-your-password-alone\" target=\"_blank\" rel=\"noopener noreferrer\">2-Step Verification: Stronger than your password alone<\/a>.<\/p>\n<p>\u2022\u00a0Yahoo: See <a href=\"https:\/\/help.yahoo.com\/kb\/turn-yahoo-two-step-verification-sln6050.html\" target=\"_blank\" rel=\"noopener noreferrer\">Two-step verification for extra account security<\/a>.<\/p>\n<p>\u2022 AT&amp;T\/Yahoo accounts (att.net\/nvbell.net\/prodigy.net\/sbcglobal.net): AT&amp;T\/Yahoo email accounts do not offer a 2nd verification method for account security, therefore we do not recommend using their email service. If you login to att.com to access your AT&amp;T paid services (wireless or U-verse) you should register a cell phone number with your account to make resetting your password easier. See <a href=\"https:\/\/www.att.com\/esupport\/article.html#!\/email-support\/KM1046479\" target=\"_blank\" rel=\"noopener noreferrer\">Use your wireless number to reset your password<\/a>.<\/p>\n<p>Additionally we recommend that you secure your other online financial, social and file sharing accounts. See the <a href=\"https:\/\/www.telesign.com\/turnon2fa\/\" target=\"_blank\" rel=\"noopener noreferrer\">THE ULTIMATE GUIDE TO TWO-FACTOR AUTHENTICATION (2FA)<\/a> website for tutorials for most popular websites.<\/p>\n<p>For help with setting up 2-step verification on any of your online accounts, please <a href=\"http:\/\/ctreno.com\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\">contact us<\/a>.<\/p>\n<a href=\"https:\/\/computertechsreno.com\/tips\/secure-your-email-account-with-2step-verification\/print\/\" title=\"Print This Article\" rel=\"nofollow\"><img decoding=\"async\" class=\"WP-PrintIcon\" src=\"https:\/\/computertechsreno.com\/tips\/wp-content\/plugins\/wp-print\/images\/printer_famfamfam.gif\" alt=\"Print This Article\" title=\"Print This Article\" style=\"border: 0px;\" \/><\/a>&nbsp;<a href=\"https:\/\/computertechsreno.com\/tips\/secure-your-email-account-with-2step-verification\/print\/\" title=\"Print This Article\" rel=\"nofollow\">Print This Article<\/a>\n","protected":false},"excerpt":{"rendered":"<p>Updated 11\/8\/2016: With email account hacking being a common\u00a0occurrence, email providers Google, Yahoo and others introduced a 2-step verification process that can keep unwanted people from accessing your email account, or help you regain access to it in the event of a forgotten password or if it has been taken over by a hacker. It [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,4],"tags":[],"class_list":["post-1247","post","type-post","status-publish","format-standard","hentry","category-passwords","category-security"],"_links":{"self":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/1247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/comments?post=1247"}],"version-history":[{"count":29,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/1247\/revisions"}],"predecessor-version":[{"id":2954,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/1247\/revisions\/2954"}],"wp:attachment":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/media?parent=1247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/categories?post=1247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/tags?post=1247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}