Learning the Two-Step


Throughout this week there has been more concern about breaking into people's online accounts.  In order to keep your data safe on your phone, email server or in the cloud there is a need to keep security in mind.  Google has recently started implementing a two-step approach to accessing data called the 2-step verification which you can read more about in the following article.


Similarly, people are linking Facebook, twitter, cloud services, etc. together with little form of authentication between each service.  If someone would break into one service then they could break into all the linked accounts without any problem.  So it makes sense to have a second layer of security to authorize access to each account.  Security always comes at a price but learning how to handle access will make everyone safer in the end.


Previous
Previous

Cloud and the tablets

Next
Next

Microsoft Reinvented