Two-factor authentication

Watch the video from our Two-Factor Authentication course, where Marla is advised to set up two-factor authentication on her new account for a system. Later, it turns out that this is what saves her account from being hacked!

You can access the entire course on our e-learning platform by logging in here. If you do not have an account, you can try it for free.

Der Kurs

Über den Kurs

All organisations and individuals are vulnerable to hackers who break into platforms to steal our user credentials to access everything from our work computer to social media accounts. Using two-factor authentication drastically reduces the risk. In fact, it protects up to 99.9% of all hacking attempts. In this course, you will learn about what two-factor authentication is, why it is effective, and how to get started with it.

Passwörter
Want to learn more?

We use passwords to log into everything from Gmail to Facebook. That is why it is so important to create strong passwords and handle them in a secure way, since they can access so much of our personal information. In this blog post, we will review how you can easily create strong passwords for every platform you use and discuss why it is so important to do so.

Want to learn more?

We use passwords to log into everything from Gmail to Facebook. That is why it is so important to create strong passwords and handle them in a secure way, since they can access so much of our personal information. In this blog post, we will review how you can easily create strong passwords for every platform you use and discuss why it is so important to do so.

Passwörter

Other material

We have also made 3 posters for the course. They contain information about two-factor authentication and highlights from the course. The posters are free to download and you can hang them up at the office. Your team will have a good reminder of what to be aware of to secure their accounts!

To-faktor-sammensat

You might also like..

Phone Scamming
Kategorie: Cybersicherheit

Phone Scamming

Learning objectives: how phone scams work, which red flags you should be aware of, and how to best handle unexpected phone calls.

Read more »
Processing personal data

Processing personal data

Learning objectives: What processing means in relation to personal data, when exactly you process data and what it means to grant other people access to personal data

Read more »
Top

Contact us

You are always welcome to contact us
for an initial and informal chat about your cyber security challenges.

Kontaktiere uns

Sie können uns jederzeit kontaktieren, um ein erstes und informelles Gespräch über Ihre Herausforderungen im Bereich der Cybersicherheit zu führen.