Learning the Two-Step
Throughout this week there has been more concern about breaking
into people's online accounts. In order to keep your data safe on your
phone, email server or in the cloud there is a need to keep security in mind.
Google has recently started implementing a two-step approach to accessing
data called the 2-step verification which you can read more about in the
following article.
Similarly, people are linking Facebook, twitter, cloud
services, etc. together with little form of authentication between each
service. If someone would break into one service then they could break into
all the linked accounts without any problem. So it makes sense to have a
second layer of security to authorize access to each account. Security
always comes at a price but learning how to handle access will make everyone
safer in the end.