Skip main navigation

What is Two-Factor Authentication?

In this video, you will learn about two-factor authentication.
6.2
In this video, we’re going over everything you need to know about two-factor authentication for the cloud. Now, why two-factor for the cloud? Cloud storage oftentimes are appealing targets for malicious hackers. Information on your cloud storage can lead to further data breaches or even blackmail attempts. And we’ve seen this with things like Celebgate. Having two-factor authentication along with a good password hygiene can help prevent data breaches. After all, if someone is able to get your password, they still have to be able to get past a second factor authentication in order to get to your files. On Google, data shows two-factor authentication blocked 100% of automated bot attacks. And this was about a year ago.
51.7
So 100% of automated bot attacks blocked by two-factor authentication. That’s huge because a lot of people will use automated tools in order to break into something. After all, it’s pretty easy to actually just run a program, let it run while you’re doing something else, and then come back for the results. So who’s using two-factor? Google Drive, OneDrive, iCloud, Dropbox, Box, Mega AWS, almost every cloud storage provider is going to provide two-factor authentication. So I highly recommend running this. So two-factor options, authentication apps. You can use things like the Microsoft authentication app, Google authentication, Authy, there’s a number of authenticator apps.
99.6
And if you’re running multiple cloud storages like I do, you don’t necessarily need the Microsoft running in the OneDrive, the Google authenticating in Google Drive. You can use something like Authy that will actually support quite a bit of different cloud storage two-factor. SMS is another option. You could have a code sent to your phone. Or it could even call you on your phone with a temporary code to authenticate. You could also use things like key fobs, like a YubiKey, a Google fob, OnlyKey, Qkey, et cetera. That’s a physical hardware device you plug in for a second factor authentication. So wrapping up, cloud storage is a appealing target.
140.9
Gaining access to a person or company’s cloud storage can be a gold mine for malicious hackers. Two-factor can help secure your cloud. Using two-factor greatly increases security by adding an additional layer of security. And we saw this with Google’s example of stopping 100% of bot attacks. Many cloud storage companies will use two-factor in one way or another. So again, it’s highly recommended using two-factor authentication for everything. So this was about two-factor authentication with the cloud storage. In the next video, we will be checking if your cloud server is leaking data. Thank you for watching. I’ll see you in the next video.

In this video, you will learn about two-factor authentication.

Using two-factor authentication can be a useful method to protect your cloud accounts as cloud storage can be a cybersecurity target.

This article is from the free online

Cyber Security Foundations: Why Cyber Security is Important

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education