![]() ![]() The average person is unlikely to have that happen. That’s when hackers use social engineering or other methods to convince your mobile phone provider to reissue your phone number to another person. I couldn’t log into a site because I couldn’t get a text.Įven if your phone is with you and working, someone can “ sim-jack” your phone. That happened to me one time when I was on an airplane and had Wi-Fi on my laptop. Sometimes you won’t be in the mobile phone range. Sure, you might have an obvious problem like losing your phone or the battery dying. ![]() However, your mobile phone isn’t always with you and is accessible. You probably always have your phone with you, so you know that only you can access the system. Move From Two Factor Text to Code BasedĪt first glance, text-based messages seem easy. That code can be texted to you, can appear on a keyfob, or you can use software to create that code. Two Factor systems rely on something you know, like a password, and something you have, like a special code. Databases get hacked, people get tricked with email phishing, and sometimes you (gasp!) reuse passwords. Although we’ve covered it before, passwords alone aren’t secure enough to protect you and your data.
0 Comments
Leave a Reply. |