Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»Tip #7 Secure Your Accounts
    Cyber Security Awareness Month Tip

    Tip #7 Secure Your Accounts

    By Gregory RivasOctober 11, 20162 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Multi Factor

    Sometimes just a password is not enough to protect your account. Multi-factor authentication provides an additional layer of protection to your accounts and information. Methods of implementing this protection includes the use of a key or code generated by an automated system, an app that expires after a certain amount of time, and security questions.

    This ensures that if your password is compromised, an attacker will not be able to get into the associated account easily. They will need a given key or code, as mentioned above, in order to complete the login.

    Popular services and websites that utilize multi-factor authentication include:

    • Google
    • Apple
    • Facebook
    • Twitter
    • Steam
    • Dropbox
    • LinkedIn

    An example of multi-factor authentication used by Google is the addition of a code that is texted to you after the initial login. If the machine from which the login is taking place is not one that was used recently, the additional layer of security is implemented. Unless the attacker has your phone as well,  your account will remain inaccessible.

    This is not a sure-fire solution though as some websites will email you the code, and if you reuse the same password for your email and the attacker was able to get into your email account, then the additional layer of security is moot.

    Consider utilizing protection beyond a username and password. Many other websites now offer additional ways to protect your information and accounts. Also make sure you do not reuse passwords for multiple accounts to further strengthen the security on your accounts.

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Previous ArticleTip #6 Set Strong Passwords
    Next Article Tip #8 Secure Your Mobile Device

    Related Posts

    Incident Response: Why Everyone Needs a Plan for Cyber Threats

    Patches and Software Updates 

    Google Groups Vulnerability

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d