Welcome to Bucaro TecHelp!

Bucaro TecHelp
HTTPS Encryption not required because no account numbers or
personal information is ever requested or accepted by this site

About Bucaro TecHelp About BTH User Agreement User Agreement Privacy Policy Privacy Site Map Site Map Contact Bucaro TecHelp Contact RSS News Feeds News Feeds

What is 2-Factor Authentication?

What exactly is two-factor authentication and what started it? Two-Factor Authentication happens when you are required to use two types of identification to log into a web site or open your email. It was started because people were using weak passwords or no passwords at all.

Normally the first factor is a password. As a reminder, your passwords should use numbers, capital and small letters and symbols. They should not be any sort of dictionary word and be at least 12 characters long, the longer the better. You should never reuse a password. If used correctly, you will need a password manager to remember them all. Getting one it is well worth it.

The second factor can vary widely from fingerprint or facial recognition to the web site sending you a numeric code via text or email that you must enter into their web site as part of the log in process. Google, Microsoft and others are working on other methods of authentication that will be secure and make it easier for the end user.

The best type of security is the one that people will use. Two-Factor Authentication takes a little longer to log into a web site, it will add 15-30 seconds. That time would be time well spent to protect your security. Web sites; especially banks, financial and health care sites, want to be sure that when a user logs in it is in fact the correct person. This is very difficult to do with just a password. Think about all the passwords stolen last year due to hackers.

This is where your phone is used to confirm your identity. Say you log into your bank's web site. If you use your phone for that login, your fingerprint or facial recognition can be used to ID you. If you use a desktop computer, they will usually send a numeric code to your phone that you use during the login process. In either case you gave the bank your mobile phone number, so they have at least some assurance that it is you. You also enter your password that matches what the bank has on file. This is how Two-Factor Authentication works, two types of identification.

As I stated earlier, web sites and companies are working to make this login process easier and more secure. This is a hard job as easier and more secure don't always work together.


George Uliano is a security professional with years of law enforcement and security experience. He holds three U.S. patents on different locking principles. This gives his Company Locking Systems International Inc the unique ability to provide its customers with the correct security at an affordable price. For additional information or to purchase Locks go to LsiDepot

More Windows Administration Information:
• The Complete Malware Prevention, Protection, and Removal Guide
• Trusted Platform Module (TPM)
• Guide to Selecting the Right Spyware Removal Tool
• Top Eleven Tips for Safe Computing
• Video - Protect Your Files with Free SafeHouseExplorer Encryption Application
• Botnets - What Are They?
• Root Kit - The Hackers Backdoor to Your Computer
• PC Chassis Intrusion Detection
• Keep Your Internet Browsing Private with InPrivate Browsing
• How Many Spyware Items Are Slowing Down Your Computer?

RSS Feed RSS Feed

Follow Stephen Bucaro Follow @Stephen Bucaro


Fire HD
[Site User Agreement] [Privacy Policy] [Site map] [Search This Site] [Contact Form]
Copyright©2001-2019 Bucaro TecHelp 13771 N Fountain Hills Blvd Suite 114-248 Fountain Hills, AZ 85268