Google Accounts Get 2-Step Verification Security

By

There are plenty of examples to talk about when it comes to losing control of an email account and inadvertently sending spam to others. Hence, everyone knows how important it is to secure the activities online. And Google is no exception. Like many other service providers, it has been always exploring new technologies and methods to make its users online experience more secure.

 Building on that tradition, Google is now offering an advanced sign-in security feature for Google Accounts called 2-step verification. While many are familiar with 1-step verification, which requires a username and password to sign in, 2-step verification adds an extra layer of security to the Google account. Consequently, Google’s advanced security requires two factors for authentication: username and password, plus a unique code generated by user’s mobile phone.

Google said that it was an extra step, but it significantly improves the security of user’s Google Account. In the official Google blog, Harry Wingo, policy counsel, said, “Now, if someone steals or guesses your password, the potential hijacker still can’t sign in to your account because he doesn’t have your phone.” Google first rolled out 2-step verification for Google Apps customers last year, and now it is bringing the same advanced protection to all its users.

According to the official company blog post, the extra step significantly improves the security of Google Account because it requires the powerful combination of both something you know—your username and password—and something that only you should have—your phone. A hacker would need access to both of these factors to gain access to your account, said the blogger.



Ashok Bindra is a veteran writer and editor with more than 25 years of editorial experience covering RF/wireless technologies, semiconductors and power electronics. To read more of his articles, please visit his columnist page.

Edited by Jennifer Russell

TechZone360 Contributor

SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More