Authy - Protect Yourself from Hackers with Two-Factor Authentication (2FA) - Tubblog: The Hub for MSPs

Authy – Protect Yourself from Hackers with Two-Factor Authentication (2FA)

Authy – Protect Yourself from Hackers with Two-Factor Authentication (2FA) image

Every Friday I share one of my favourite finds of the week — a website, tool or an app that has impressed me.

My Friday Favourite this week is Authy – Protect Yourself from Hackers with Two-Factor Authentication (2FA).

What is it?

Authy is a free app that enables you to use Two-Factor Authentication with your favourite sites, such as Google, Facebook, Amazon and more.

How can it help me?

If you’re worried about your online accounts being hacked or taken over — or worse, have seen friends on Facebook or other social media sites already suffer this — then Two-Factor Authentication (2FA) is a great solution.

The traditional methods of relying on just usernames and (often, weak) passwords to secure your online accounts are no longer safe.

2FA is an additional layer of security that requires not only a username and a password but an additional code that is received by a device you own — in most cases, your Smartphone.

In short, 2FA is the best way to protect yourself online.

You can receive 2FA codes via SMS (text message) to your phone, but if you’re out of signal area, then using an app such as Authy can generate your secure codes without needing an Internet connection.

Authy is a free tool that generates these codes. You download it and get started using the range of 2FA guides that Authy provides for setting up 2FA for popular sites such as Facebook, Google, Amazon and more.

Authy is a free app that enables you to use Two-Factor Authentication with your favourite sites Click to Tweet

If you’re *not* a techy and that seems complicated — it really isn’t. It’s no different to entering a PIN when you use your credit card.

Try it out, it’s easy and it’ll keep you safe online.

How much does it cost?

Authy is free to download and use.

How can I get it?

Authy Two-Factor AuthenticationYou can download Authy for Android, iOS, Windows, Apple Mac and the Google Chrome web browser.

You can find out more about Two-Factor Authentication by visiting the Authy homepage.

You can also visit the Authy Facebook page, follow Authy on Twitter, or follow Authy on LinkedIn.

Thanks to Matt Barton of MSP Comparison for introducing me to Authy!

You Might Also Be Interested In

RICHARD TUBB

Richard Tubb is one of the best-known experts within the global IT Managed Service Provider (MSP) community. He launched and sold his own MSP business before creating a leading MSP media and consultancy practice. Richard helps IT business owner’s take back control by freeing up their time and building a business that can run without them. He’s the author of the book “The IT Business Owner’s Survival Guide” and writer of the award-winning blog www.tubblog.co.uk

All Posts

You might like:

In-House or Outsourced Cybersecurity: What’s Best for MSPs? image

In-House or Outsourced Cybersecurity: What’s Best for MSPs?

Article | By Graham Pierrepoint
Don’t Count Sheep: 3 Tech Gadgets to Help You Sleep image

Don’t Count Sheep: 3 Tech Gadgets to Help You Sleep

Personal Development | By Richard Tubb
Brigantia Roadshow: Tools For MSPs To Mitigate Insider Threats image

Brigantia Roadshow: Tools For MSPs To Mitigate Insider Threats

Article | By Stephen McCormick
Key Importance of Privacy for MSPs and Clients image

Key Importance of Privacy for MSPs and Clients

Article | By Guest Author
Championing the Cybersecurity Right of Boom and the MSP Revolution image

Championing the Cybersecurity Right of Boom and the MSP Revolution

Article | By Graham Pierrepoint
Guardz: Unified Security Controls Built for MSPs Who Manage Small Businesses image

Guardz: Unified Security Controls Built for MSPs Who Manage Small Businesses

Security | By Richard Tubb
Spotlight on 2024 Cyber Trends And AI-Powered Email Threats image

Spotlight on 2024 Cyber Trends And AI-Powered Email Threats

Article | By Stephen McCormick
Breakthrough Ways Of Selling Cybersecurity Solutions To SMBs image

Breakthrough Ways Of Selling Cybersecurity Solutions To SMBs

Article | By Stephen McCormick
The MSP Opportunity in Up-Serving and Cross-Selling image

The MSP Opportunity in Up-Serving and Cross-Selling

Article | By Richard Tubb
Untold Cyber Attack Stories: A Shocking Perspective For MSPs image

Untold Cyber Attack Stories: A Shocking Perspective For MSPs

Article | By Stephen McCormick
Five Powerful Security Tips for Keeping Data Secure This Christmas image

Five Powerful Security Tips for Keeping Data Secure This Christmas

Article | By Stephen McCormick
Breaches, Brews and Banter: A Fun Roadtrip with Cybersecurity Experts Huntress image

Breaches, Brews and Banter: A Fun Roadtrip with Cybersecurity Experts Huntress

Events | By Richard Tubb

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Share via
Send this to a friend