Sunday, March 24, 2019

How to set up two step verification on your social media account

One of the most remarkable developments in the consumer technology industry in the past two decades is the emergence of social media networks. Social media has revolutionized the sort of social connections and interactions we have offline. Additionally, it has enhanced how we communicate and stay informed.
Nowadays, billions of people around the world use one or several of the existing social networking platforms daily to communicate with family, friends, and colleagues. Also, many of us use some of our social media accounts to stay abreast with events and current affairs happening around us and in the lives of those we are connected with on the networks. Although it has its demerits, social media has indubitably brought great benefits to us.
With all the attractions of social networks, it’s easy to get immersed in your online engagement and forget an essential aspect of your digital life — security. However, the risk of account breach (unauthorized access) by bad actors with nefarious intent is real. In fact, every year, thousands of accounts are compromised. Affected users may have their personal details and identities stolen and sold to other bad actors who likely use them for criminal aims.

Two-Step Verification

Such account breaches necessitate the need for the companies behind the platforms to improve their security practices and safety features. One such security feature that is increasingly adopted is the two-step verification. Sometimes known as two-factor authentication (2FA), this account security feature requires any person attempting to gain access to an account to provide additional proof of authenticity — showing that they are allowed to access the account. That second step usually requires the person to enter a code sent to the account owner’s phone or answer a security question pre-defined and answered by the account owner. Only when the right code or answer is entered will the account be successfully accessed. In essence, this two-step verification provides an additional layer of account security.
The practical implication of this feature is that when someone attempts to login from a device not recognized as yours, you will get an alert on your mobile phone or email address about attempted login. Usually, the IP address and location of the unrecognized device will be included.
This two-step verification is significant because in the past before smartphones became popular, internet users only needed their username or email address and password to log into their accounts online. Increase in both password theft and sophistication of hackers became a real and growing concern. Furthermore, using,specially designed bots, hackers could break into potentially vulnerable accounts using stolen account credentials. 
Fortunately, nowadays on many web and mobile applications, users have the option to set up the two-step verification process for their accounts. In other cases, the process is compulsory.
Below we look at how this important security feature is implemented across some big social media platforms.

Facebook

As the most broadly used social networking platform, Facebook’s implementation of the two-step verification feature is unconditionally expected. Thankfully, Facebook users are allowed the freedom to turn on the account security feature using two second-step authentication methods namely:
  • SMS codes sent as text messages to your smartphone.
  • Access codes from a third party authentication app (e.g., Google Authenticator)
To activate the feature, you have to take the following steps:
  1. When logged in, go to your Settings and select the Security and Login option.
  2. Go down to the Use two-factor authentication option then click Edit.
  3. Select the authentication method of your choice and then follow the instructions that appear on your screen.
  4. Once you have turned on the chosen authentication method, click Enable.
Once that it successfully set up, when trying to log in from an unrecognized device, you will have the options to
  1. Consent to login attempts from recognized devices.
  2. You can also use recovery codes for situations when you don’t have your phone.
  3. Tap your security key on another device. The security key can be added when setting up the two-step authentication process.

Instagram

Similar to its parent company Facebook, Instagram allows its users the option of setting up the two-step authentication process. The procedure requires either of the same two authentication methods as Facebook.
When the preferred method is SMS codes sent via mobile text message, the following steps have to be taken to activate the feature.
  1. Go to your profile page and tap the menu icon in the top right-hand corner.
  2. Select the Settings option from the list.
  3. From the list that appears, selectPrivacy and Security.
  4. Choose Two-Factor Authentication.
  5. Tap on the switch icon next to Text Message.
  6. If you don’t have a phone number confirmed and associated with your account, you’ll be prompted to provide it.
  7. After entering the number, tap the next icon to complete the setup.
Alternatively, if your preferred authentication method is an authentication app, you’ll need to follow the steps below.
  1. Go to your profile page and tap the menu icon on the top right corner.
  2. Select the Settings option from the list.
  3. From the list that appears, selectPrivacy and Security.
  4. Choose Two-Factor Authentication.
  5. Tap the Get Started button if you haven’t previously turned on the two-step authentication feature.
  6. Tap on the switch icon next to Authentication App and follow the on-screen instructions.
  7. To complete the process, enter the code you received from the authentication app.

Twitter

Twitter also allows its users to set up the two-step verification security feature. In order to set up what the company calls login verification, a user must have a confirmed email address and a telephone number confirmed and connected to the account. These requirements will help whenever account recovery becomes necessary. Twitter also offers two authentication methods – SMS code via text message and authentication code generated from a third party authentication app.
The following are the steps you have to take to set up your Twitter login verification via SMS.
  1. From the top menu, choose the Profileicon and select Settings and Privacy.
  2. Click on Account settings and then Set up login verification.
  3. After reading the guiding instructions, click Start
  4. Input your password and click Verify.
  5. Tap or click Send code.
  6. Enter the verification code you received on your device before you click Submit.
  7. You should click Get Backup Code. Doing so will generate a code for future use in situations where you are without your valid phone number for whatever reason. It is advised you safely store the code. For example, you can take a screenshot of it and save it to your cloud storage application.
After successfully setting up the process, each time you attempt to login to Twitter, you’ll be prompted to enter a six-digit code sent to your confirmed phone number. You can learn how to use the authentication code method here.

WhatsApp

If you’re one of the more than 1 billion active WhatsApp users, you have the option to enable the double verification feature. When successfully activated, you’ll be required to provide a six-digit PIN each time you try to verify your phone number. The PIN is generated through the process of enabling two-step verification.
To turn on two-step verification on WhatsApp, you’ll have to:
  1. Go to Settings.
  2. Select Account.
  3. Select Two-step verification.
  4. Tap Enable.
You can also add your email address upon activating this feature. The email address will be an alternative for you to receive a link should you forget your PIN. Using the link, you’ll be able to disable two-step authentication. The company strongly advises users to be careful enough to give the correct email address since they do not verify the provided address. Similarly, if you never requested to confirm your phone number but received a link from WhatsApp, you’re advised to ignore it as someone else may be trying to do without your knowledge or permission.

LinkedIn

In order to be able to set up the two-step verification on LinkedIn, the user is required to have a phone number confirmed and associated with their account.
To activate the extra account security feature, you should take the following steps:

  1. Click on the Profile icon with the label Me at the right area of the top menu bar.
  2. From the drop-down menu, choose Settings & Privacy.
  3. Under the Account section, select Login and Security.
  4. In the new page that opens, select the Account tab (the first tab before Privacy).
  5. Click Turn On on the right end of the Two-step verification to activate the feature. If you have not connected a phone number, you’ll have to click Change and then Add a phone number.
  6. Input the verification code sent your connected phone number into the box and click Verify.

Snapchat

Snapchat offers the two standard authentication methods earlier mentioned. The following are the steps you have to take to turn on the feature.
  1. When on the main Camera home screen, tap on the Profile icon located on the top left corner.
  2. Tap the Settings icon shown as a cogwheel.
  3. Select Two-Factor Authentication:
  4. Follow the subsequent instructions that are provided on your screen.
The company also advises users who activate this feature to generate a Recovery Code and save it in a safe location. It will be helpful in scenarios where the phone is missing, or phone number is changed, or when the phone is restored to original settings.
Lastly, if you’ve never really used the two-factor authentication feature on your social media accounts, now is the time to do so. Use what you’ve learned here to protect your diappfrom  access by people who may be bent on doing you harm online. As a matter of fact, you’d be well advised to apply this vital safety feature across your other online accounts that hold valuable information (e.g., online banking application, financial trading or investing platfapplicationsthcare, and pharmaceutical applicatio

No comments:

Post a Comment