Authy - Protect Yourself from Hackers with Two-Factor Authentication (2FA) - Tubblog: The Hub for MSPs

Authy – Protect Yourself from Hackers with Two-Factor Authentication (2FA)

Authy – Protect Yourself from Hackers with Two-Factor Authentication (2FA) image

Every Friday I share one of my favourite finds of the week — a website, tool or an app that has impressed me.

My Friday Favourite this week is Authy – Protect Yourself from Hackers with Two-Factor Authentication (2FA).

What is it?

Authy is a free app that enables you to use Two-Factor Authentication with your favourite sites, such as Google, Facebook, Amazon and more.

How can it help me?

If you’re worried about your online accounts being hacked or taken over — or worse, have seen friends on Facebook or other social media sites already suffer this — then Two-Factor Authentication (2FA) is a great solution.

The traditional methods of relying on just usernames and (often, weak) passwords to secure your online accounts are no longer safe.

2FA is an additional layer of security that requires not only a username and a password but an additional code that is received by a device you own — in most cases, your Smartphone.

In short, 2FA is the best way to protect yourself online.

You can receive 2FA codes via SMS (text message) to your phone, but if you’re out of signal area, then using an app such as Authy can generate your secure codes without needing an Internet connection.

Authy is a free tool that generates these codes. You download it and get started using the range of 2FA guides that Authy provides for setting up 2FA for popular sites such as Facebook, Google, Amazon and more.

Authy is a free app that enables you to use Two-Factor Authentication with your favourite sites Click to Tweet

If you’re *not* a techy and that seems complicated — it really isn’t. It’s no different to entering a PIN when you use your credit card.

Try it out, it’s easy and it’ll keep you safe online.

How much does it cost?

Authy is free to download and use.

How can I get it?

Authy Two-Factor AuthenticationYou can download Authy for Android, iOS, Windows, Apple Mac and the Google Chrome web browser.

You can find out more about Two-Factor Authentication by visiting the Authy homepage.

You can also visit the Authy Facebook page, follow Authy on Twitter, or follow Authy on LinkedIn.

Thanks to Matt Barton of MSP Comparison for introducing me to Authy!

You Might Also Be Interested In

RICHARD TUBB

Richard Tubb is one of the best-known experts within the global IT Managed Service Provider (MSP) community. He launched and sold his own MSP business before creating a leading MSP media and consultancy practice. Richard helps IT business owner’s take back control by freeing up their time and building a business that can run without them. He’s the author of the book “The IT Business Owner’s Survival Guide” and writer of the award-winning blog www.tubblog.co.uk

All Posts

You might like:

Fight Back Against the Hackers with Huntress Security Solutions image

Fight Back Against the Hackers with Huntress Security Solutions

Article | By Stephen McCormick
Complement Your Cybersecurity Strategy with Security Awareness Training image

Complement Your Cybersecurity Strategy with Security Awareness Training

Article | By Stephen McCormick
How A Penetration Test Uncovered Astonishing Network Flaws image

How A Penetration Test Uncovered Astonishing Network Flaws

Artificial Intelligence | By Richard Tubb
Defence in Depth: Better Results From a Layered Security Strategy image

Defence in Depth: Better Results From a Layered Security Strategy

Article | By Stephen McCormick
Phishing Defence Coaching: A Targeted Approach To End-User Security Training image

Phishing Defence Coaching: A Targeted Approach To End-User Security Training

Article | By Stephen McCormick
Understanding Deepfake Technology: Why It’s A Risk To Your Business image

Understanding Deepfake Technology: Why It’s A Risk To Your Business

Article | By Stephen McCormick
Cybersecurity Masterclasses: Practical Advice To Boost Security For MSPs image

Cybersecurity Masterclasses: Practical Advice To Boost Security For MSPs

Article | By Stephen McCormick
In-House or Outsourced Cybersecurity: What’s Best for MSPs? image

In-House or Outsourced Cybersecurity: What’s Best for MSPs?

Article | By Graham Pierrepoint
Don’t Count Sheep: 3 Tech Gadgets to Help You Sleep image

Don’t Count Sheep: 3 Tech Gadgets to Help You Sleep

Personal Development | By Richard Tubb
Brigantia Roadshow: Tools For MSPs To Mitigate Insider Threats image

Brigantia Roadshow: Tools For MSPs To Mitigate Insider Threats

Article | By Stephen McCormick
Key Importance of Privacy for MSPs and Clients image

Key Importance of Privacy for MSPs and Clients

Article | By Guest Author
Championing the Cybersecurity Right of Boom and the MSP Revolution image

Championing the Cybersecurity Right of Boom and the MSP Revolution

Article | By Graham Pierrepoint

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore.

Share via
Send this to a friend