When browsing the internet on any device – computer, phone, tablet – or if you have started using a new device, you may notice that you are asked to verify that it is you who wants to access to a website or to your email.

This is called the two-step verification process. It’s here to stay (until something better comes along), and it’s to your advantage to use it as much as possible.

Two-step verification is necessary because most of us have bad passwords and don’t always take the necessary precautions to protect our online security. We have weak passwords and when a website is hacked, our information ends up on the dark web to be sold to cyber criminals. So the industry has added this second layer of protection to our advantage.

How it works?

In most cases, two-step verification works like this:

  • When you log in to a website, you will need to enter your password (this is the first step).
  • You will then be asked to enter any code you receive from your email or other device (this is the second step).
  • In most cases, you will need to obtain a verification code and you will be asked if you want to receive it as a text message on your mobile phone or an email on your computer. Make sure they have your correct cell phone number or email address. If either or both are incorrect, it could mean that a hacker has your password or that you were lax in updating your information.
  • You will be asked to enter the code you just received.
  • In most cases, the verification is for a specific device, and once you’ve indicated that you want that device to be recognized, you won’t need to go through the process again.

For the most part, the whole process is simple and not that difficult.




Keep in mind that the benefit of any two-step verification process is that until hackers have your computer or device, they won’t see the required code. And without the code, they can’t log in as you – unless they’ve hacked your email, which is another problem. We like to use a text message to your cell phone as our primary method of two-step verification, since chances are you’ll have the device with you.

A Necessary Inconvenience

It’s no secret that a majority of the tech industry believe that too few people don’t take enough care of their online security. Tech companies know this will be an “unappreciated” inconvenience for many of their customers, but they think they need to take matters into their own hands by requiring new verification routines.

We consider this a welcome requirement, but beyond that, we urge you to take advantage of two-step verification when offered.