How can you set up a two step verification process for your Gmail account? Since emails have become such an important part of our regular exchanges and storage of information and data and a lot of people utilize their email to keep private and sensitive information, that, when accessed by people other than you, this can damage your reputation or compromise your general security. Envision an instance wherein you have some valuable information about your email account passwords or your bank account and then another person gets access to this information. Would not this create a big damage? It is in this case that some people would like to have really high security on their Gmail accounts. In lieu of this, Gmail had made it possible for anyone to go through a two step verification process whenever you or someone would like to log into your Gmail account using an unknown computer or mobile device. In order to set up the two step verification process for Gmail, just follow the procedure below:
(1) Log in to your Gmail email account by typing http://www.gmail.com on the address bar of your chosen web browser.
(2) Plug in both of your username and password, as prompted by Gmail.
(3) Once in your Gmail account, click on your email or profile image on the upper right portion of your Gmail window. Then click on the blue “My Account” button.
(4) Next, click on the “Sign-in & security section.
(5) Afterwards, click on the “Signing in to Google” under the “Sign-in & security” menu.
(6) You will then be redirected to another web page. Find the “2-Step Verification” under the “Password & sign-in method” on the right most portion of the web page. If you see that the “2-Step Verification” is “Off,” click it to set it up.
(7) For the next web page, click the “Start setup” blue button on the right. You will be redirected to another web page so you can sign in once again.
(8) To set up your phone, there are four steps. First, select your country (which would pick out your country code) and afterwards plug in your phone number. You can select “text message (SMS” or “Voice Call” as means for verification. Afterwards, click on the “Send code” button so you can verify your phone number. Enter the verification code sent to your number on the text field that will be provided to you. Then, click on the “Verify” button. The subsequent web page will ask if you want to trust or not the computer wherein you are setting up the two step verification. If you choose to trust the computer, click the box on the left part of the bolded text that reads “Trust this computer.” Afterwards, click the “Next” button. The next web page will ask that you confirm your decision to set up the Gmail two step verification process. Afterwards, click the “Confirm” button. You will then be brought to a web page wherein you can include another backup phone number or edit your main phone number. We suggest that you scroll down to their “Backup codes” section so you can save the codes for future use in the event that you lose your phone and need to log into your Gmail account. So you can back up your codes, just click the button, “Print or download.” Keep these codes somewhere safe.
As a whole, you should incorporate authentication or verification processes in all of your accounts, including emails of course. This security measure protects your accounts from being compromised or hijacked. These verification processes is the procedure of authentication that would make sure that you are yourself, exactly the owner of the email account before it gives you access. Authentication depends on something that you know, like a password or even something that you have alike a mobile phone, or maybe even a fingerprint.
The disadvantage of the typical authentication models is that they depend on something that you know and this something is typically easily cracked, guessed, or even compromised. Even though usernames are something that you are, it is simply a word, something you know. This is, in general, not kept secret or protected, so you should not really consider it. That only leaves you with the password.
Data breaches like in Gawker.com and Rockyou.com show that many users rely on weak passwords that are easy for an outside attacker to figure out. There are also a lot of people who depend on the same password and user name for all of their many accounts. This makes just getting one password the important key to the entire house of one person’s online world.
As soon as an account has been compromised, the attacker can edit details, like alternate email addresses, phone numbers, as well as other contact information. This makes it really difficult for the right owner to get back his or her account.