Cyber

Why two-factor authentication is your best cyber defense

lock on keyboard

So, we’re betting at least some of your apps and online accounts have asked, “Do you want to opt into two-factor identification?” And, if you’re like many people, all that texting and code retrieval might seem just a little too much trouble.

 

Is all that security really necessary? Short answer: YES. And it doesn’t have to be hard.

Why should you use two factor identification?

Cyber attacks, personal data leaks, and phishing scams are becoming more common as hackers get more sophisticated and as we conduct more of our personal and financial transactions on apps and online. Scary factoid: the FBI’s Internet Crime Complaint Center reported that people lose $57 million in phishing and smishing schemes each year.1

 

Two-factor identification (2FA) provides an extra layer of protection to help safeguard your personal data and your dollars when you are accessing websites and apps.

What exactly is two-factor identification?

Also referred to as “two-step authentication,” “two-step verification” or “multi-factor authentication,” 2FA is an electronic security protocol that prevents you from accessing a website or an app until you validate your identity with two or more pieces of proof. This helps ensure that unauthorized users can’t pretend to be you.

 

Multi-factor identification “secures your logins from attackers exploiting weak, stolen, or leaked credentials,” says Laura Bennett, Senior Vice President, e-Consumer North America for BlinkSM by Chubb®.

How do you enable 2FA protection?

Many widely-used internet service providers (e.g. Google, Apple, Amazon) and social media platforms (e.g. TikTok, Snapchat, Facebook/Instagram), as well as financial sites, productivity, and personal apps (e.g. Paypal, Slack, Fitbit) have 2FA capability.

 

  • A helpful website that lists sites currently offering multi-factor identification can be found here 2FA Directory.
  • Enabling 2FA is typically done through your user account and/or security tab. Instructions vary, so check with the individual sites or apps for specifics.
  • There are a number of authentication apps that consolidate and streamline your 2FA efforts. In other words, the app automatically authenticates you and eliminates the code sending step. The advantages of using these are that they typically work even when you don’t have access to cell service, and they are considered more secure than text messages. Some of the most popular apps are Authy, Google Authenticator, Duo, and Microsoft Authenticator.

 

We do not endorse any particular vendor or brand of 2FA, but consumers should take time to research options along with the benefits of utilizing 2FA for their circumstances.

Is two-factor identification foolproof?

Currently, 2FA apps are the most secure user authentication methods. However, it is important to always practice good cyber hygiene habits:

 

  • "Leverage alerts on all accounts (especially financial) to warn you of suspicious activity,” Bennett advises.
  • Use a strong and unique username and password and never save passwords in your web browser.
  • Keep your computer’s operating system up to date. This is to ensure you have the latest security features in place.
  • Be wary of emails, texts, or attachments from unfamiliar or suspicious-looking senders especially those that ask for personal data.
  • Avoid using open wi-fi networks, which are easily hacked.

 

We do not endorse any particular vendor or brand of 2FA, but consumers should take time to research options along with the benefits of utilizing 2FA for their circumstances.

The Blink bottom line

In the war against cybercrime, knowledge is power. You’re now armed with two-factor authentication wisdom — a key weapon in your personal protection arsenal.

cyber abstract representation

Blink℠ by Chubb® Cyber Insurance

Easy, effortless insurance for everyone.

Insights and expertise

We help you stay ahead and informed with these helpful tips and tricks for protecting your home, car, and more.
woman holding her phone
Cyber
Tips for avoiding identity theft | Chubb
Many sources for Identity Theft are out of your control. But you can control some potential sources of ID theft and reduce your chances of becoming a victim. Here are some ways.
woman working in home office
Cyber
10 tips to stay cyber safe when you’re working from home
Cyber criminals know that, with more people online, there are more ways to take advantage of vulnerabilities to gain access to protected and personal information.
upset woman with computer
Cyber
How to know if you’re a victim of identity theft
As we spend more of our lives online – working, going to school, shopping, and more – we face an increasing risk for identity fraud. That’s why we need to be aware of the top warning signs that indicate you may be a victim of identity theft.
person using tablet
Cyber
MISSING! What to do if your phone or computer is stolen
Acting quickly can help prevent bad actors from engaging in identity theft and other fraudulent activity.
payment with online banking
Cyber
5 steps to take if you believe your identity has been stolen
These proactive measures can help safeguard your personal information.
credit card and lock
Cyber
9 tips to help protect your identity during tax season
Tax season is an opportune time for identity theft. But if you know what to look for and what NOT to do, you can help protect your identity and keep your hard-earned money.
two bully boys posting video
Cyber
9 ways to protect your kids from cyberbullies
With so much time spent on a computer, gaming system, tablet, or cell phone, it’s no wonder bullies are taking advantage of those in cyberspace. Learn more about the top ways to help protect your kids from cyberbullies.
hands texting professional
Cyber
Smishing: A cyber security threat
Smishing is growing in popularity as a form of cyberattack. Learn how it works and how to protect yourself.
woman holding a phone
Cyber
Do you need a social media policy for your nanny?
Does your nanny have a smartphone addiction? Not only can this impact his or her productivity, but it could put your family at risk. If your nanny posts your children's location or other personal details on social media, it could end up in the wrong hands of kidnappers or cybercriminals. Here's how to create a social media policy to keep your family safe.
phone notebook and glasses
Cyber
5 reasons to recycle your electronics, instead of chucking them
If you like to keep up with the latest technology, you probably have a pile of electronic castoffs somewhere in the house, garage or possibly in the garbage. But, it’s so much better -- for you and the planet -- to recycle them instead of throwing them away. Here’s why.

Find an Agent

Speak to an independent agent about your insurance needs.

This document is advisory in nature and is offered as a resource to be used together with your professional insurance advisors in maintaining a loss prevention program. It is an overview only, and is not intended as a substitute for consultation with your insurance broker, or for legal, engineering or other professional advice.

Chubb is the marketing name used to refer to subsidiaries of Chubb Limited providing insurance and related services. For a list of these subsidiaries, please visit our website at www.chubb.com. Insurance provided by ACE American Insurance Company and its U.S. based Chubb underwriting company affiliates. All products may not be available in all states. This communication contains product summaries only. Coverage is subject to the language of the policies as actually issued. Surplus lines insurance sold only through licensed surplus lines producers. Chubb, 202 Hall's Mill Road, Whitehouse Station, NJ 08889-1600.