Practical, easy-to-follow guides to help you improve your cybersecurity posture and protect your digital life.
The one setting that stops most account takeovers
The one setting that stops most account takeovers
If someone steals your password today, they can probably log in to your account. Multi-factor authentication (MFA) is the one setting that stops them from getting in, even with the right password. It's free. It takes about two minutes per account. And it's the single biggest security upgrade most people can make.
When you log in to an account with MFA turned on, the site asks for two things:
A scammer who buys your password on the dark web gets stopped at step two. They don't have your phone. They can't finish the login. Your account stays yours.
Did you know?
Microsoft's research shows MFA blocks more than 99% of automated account takeovers. Most of the account hacks you hear about in the news would have failed if MFA was on.
1. App-based codes (recommended). You scan a QR code once, and from then on your phone generates a new 6-digit code every 30 seconds. Works without internet. The scammer would need your physical phone to get the code.
2. A physical security key. A small USB or NFC device (like a YubiKey) that you tap to prove it's you. The strongest option, especially for banking or work accounts.
3. A text message with a code. Weaker than the other two because scammers can sometimes intercept texts, but much, much better than no MFA at all. If SMS is the only option a site offers, turn it on anyway.
If you're on iPhone or Mac:
If you're on Android, Windows, or want to use the same tool across devices:
If you want something dedicated just for MFA codes:
Avoid storing MFA codes in the same browser that saves your passwords. If someone gets into your browser, you don't want both halves sitting together.
The menu name varies, but the setting is almost always two clicks deep. Search the settings for "two-factor", "2FA", "MFA", or "security".
When you turn on MFA, the site will usually give you 8 to 10 one-time backup codes. Save these. They're your way back in if you lose your phone.
After you use a backup code, most sites will invalidate it. Generate a fresh set if you're running low.
If you only have time for a few, start here. In order:
"What if my phone dies or gets stolen?" That's what backup codes are for. Store them somewhere separate from your phone.
"Do I have to do this every single time I log in?" No. Most sites let you check "trust this device" so MFA only kicks in when you log in from a new browser or location. That's safe. The bad guys are logging in from somewhere else.
"What if I'm not good with phones?" A family member can help you set it up once. After that, it's the same two-step login every time. It doesn't get harder. It gets easier once you're used to it.
MFA is not optional anymore. Every month, our blog covers a scam where the only thing saving the victim was MFA being on, or the only thing that sunk them was MFA being off. Pick two accounts right now. Turn it on. Come back tomorrow and do two more. In a week you'll be done, and you will have taken the single biggest step toward staying safe online.
If you're looking for guidance on a specific cybersecurity topic that isn't covered here, let us know and we'll consider adding it to our resource library.