How do I enable Multi-Factor Authentication?

Multi-Factor Authentication (MFA) is a form of additional security that you can add to accounts to protect yourself against hackers and unwanted logins from third parties. Also known as Two-Factor Authorization (TFA) or Two-Step Verification (2SV), this strategy has been adopted by many of the best and most popular tech companies to provide users with greater oversight and control when it comes to signing in to their accounts.

How do I enable Multi-Factor Authentication?

How does MFA work?

Whatever you call it, the underlying principle of MFA remains the same. Essentially, you link an account with a secondary device (e.g., your phone) or method of communication (e.g., an email or text) so that when a login is attempted for your account you are alerted and sent a means of authorizing the login.

If you link an account to your phone, you will likely receive a notification which allows you to approve the login from your phone. If you’ve set up MFA with email or text, you’ll receive a message with a code that will need to be entered on the login screen to complete the login process.

Why is MFA so effective?

The reason so many online service providers are now offering MFA is because it means that, should your password be compromised, you can still control access to your account and prevent third parties from accessing your information simply because they have your password.

The authentication request you receive also acts as an implied notification of an illicit login attempt. If it’s not you who’s just tried to login then your account is in danger and you can act quickly to change your password to make it secure again.

Setting up Multi-Factor Authentication

Each account will have slightly different ways in which you set up MFA. Here are guides on how to activate multi-factor authentication for the two most common accounts.

Google two-step verification

Google has a comprehensive Authentication process, which includes helping you set up strong passwords, activating two-step verification (2SV) and strengthening your account with additional Google Security. There is a basic four-step process for 2SV activation:

  1. Open your Google Account.
  2. In the navigation panel, select Security.
  3. Under “Signing in to Google,” select 2-Step Verification and then Get started.
  4. Follow the on-screen steps.

Apple ID two-factor authentication

Apple’s two-factor authentication (2FA) can be set up across all your devices. The process is a little different for a Mac than for your iPhone, iPad or iPod Touch. Here’s the basic steps to follow:

Mac 2FA
  1. Open the Apple menu.
  2. Select System Preferences, then click Apple ID.
  3. Click Password & Security under your name.
  4. Next to Two-Factor Authentication, click Turn On.
iPhone, iPad and iPod Touch 2FA
  1. Go to Settings > [your name] > Password & Security.
  2. Tap Turn On Two-Factor Authentication.
  3. Tap Continue.
  4. Enter the phone number you want to receive verification codes on when you sign in. You can choose to receive the codes by text message or via an automated phone call.
  5. Tap Next.
  6. Enter the verification code to verify your phone number and turn on two-factor authentication.

When setting up Apple 2FA, you may be asked to answer your Apple ID security questions, so be sure to remind yourself of your answers before starting the process.

Setting up MFA for other accounts

Especially for any accounts that contain any of your personal or sensitive information, like banking and social media, it’s worth checking if you can set up multi-factor authentication.

For most accounts, MFA will be listed as an option in the account settings, and it will generally only take a few basic steps. Start with your general-use accounts — like Microsoft — and your social media accounts, such as Facebook, Instagram and Twitter.

Once you’ve activated MFA, you’ll have an additional layer of security for your accounts that will keep your information better protected. For more information about keeping your data secure, check out our Total Defense Security blog or contact us to speak with an expert.