Two-factor authentication

Watch the video from our Two-Factor Authentication course, where Marla is advised to set up two-factor authentication on her new account for a system. Later, it turns out that this is what saves her account from being hacked!

You can access the entire course on our e-learning platform by logging in here. If you do not have an account, you can try it for free.

The course

About the course

All organisations and individuals are vulnerable to hackers who break into platforms to steal our user credentials to access everything from our work computer to social media accounts. Using two-factor authentication drastically reduces the risk. In fact, it protects up to 99.9% of all hacking attempts. In this course, you will learn about what two-factor authentication is, why it is effective, and how to get started with it.

Passwords

Want to learn more?

We use passwords to log into everything from Gmail to Facebook. That is why it is so important to create strong passwords and handle them in a secure way, since they can access so much of our personal information. In this blog post, we will review how you can easily create strong passwords for every platform you use and discuss why it is so important to do so.

Want to learn more?

We use passwords to log into everything from Gmail to Facebook. That is why it is so important to create strong passwords and handle them in a secure way, since they can access so much of our personal information. In this blog post, we will review how you can easily create strong passwords for every platform you use and discuss why it is so important to do so.

Passwords

Other material

We have also made 3 posters for the course. They contain information about two-factor authentication and highlights from the course. The posters are free to download and you can hang them up at the office. Your team will have a good reminder of what to be aware of to secure their accounts!

Two-factor authentication posters

You might also like..

Update 2.0
Category: Cyber security

Updates

Learning objectives: Why updates are necessary for good IT security, and what you need to be aware of in relation to updates

Read more »
Top

Contact us

You are always welcome to contact us
for an initial and informal chat about your cyber security challenges.