Skip to content

A Password Manager Plus Two-Factor Authentication: The One-Two Punch That Knocks Hackers Out!

boxing-gloves

Some of the best advice you could follow is to use a password manager, plus two-factor authentication for every account you have. With this one-two punch, you have a much better chance of deflecting a hacker going after your accounts.

If this is news to you, you need to read this article and take the recommendation to heart. Cybercrime is not letting up. It’s up to YOU to take whatever measures you can to protect your own accounts.


Here’s what everyone needs to consider:

  • Websites do their best to prevent unauthorized logins, but they have no way of knowing who is actually logging into your account. It could be you, or it could be a hacker with your login credentials.
  • Companies and organizations spend time running their operations and reaching their goals. Security is important to them, but it isn’t their top priority, and they would be the first to honestly acknowledge that.
  • Hacks and data breaches against organizations have only grown more sophisticated over time. Now, the sudden arrival and explosion of Artificial Intelligence (AI) attacks on networks will continue. Probably at an even more advanced pace.

While it’s true that advances in technology will also help security experts battle cybercrime, the numbers, unfortunately, are on the criminals’ side. Cybercriminals will even recruit innocent or poor citizens in faraway countries and force them to work in cybercrime centers.  

In short, cyberattacks and attacks on people’s accounts (your accounts included) aren’t going anywhere soon.

Absolutely Doable and It's Free.

A password manager plus two-factor authentication knocks hackers out.

Here’s a difficult fact to absorb: While a smart, complex password strategy puts you at lower risk for an (easy) hack, it doesn’t eliminate risk totally.  

Two-factor authentication is like forcing a hacker to crack two vaults.

Why? Because if a cybercrook knows or steals your username and password (even a complex one) they can log into an account.  It happens all the time in all sorts of ways. Sometimes it is the byproduct of a data breach. Other times it as a result of a scam where the victim divulges their password to a scammer.

Even if they have your username and password, you can still keep them out of your account with this one-two punch approach to account security:

  • Complex passwords and a smart personal strategy for managing passwords is critical. Too many people use simple, basic (dumb) passwords or use the same passwords for multiple accounts. Both ideas are bad habits that lead to accounts being hacked and breached every day.
  • Two-factor authentication (2FA), which is simply the name given for an extra step in the process of logging into one of your accounts. The extra step, which comes after you enter your username and password, requires you to request a secret code from the account you’re logging into (your bank or a social media account, for example). 

Two-factor authentication can prevent that because it can stop a thief who has someone’s login credentials. After entering a username and password, the would-be criminal will be asked for an extra code (typically received on the account holder’s phone).

Without receiving and then entering that code, the thief is stopped dead in their tracks.

The process is sometimes called two-step verification, and there’s a version called MFA, for multi-factor authentication. There are also different types of 2FA and each one tends to get more complex or complicated. They do, however, deliver a higher level of security or certainty.

Still, all security experts agree that even the basic version of 2FA is a great way to go.

Put a block on hackers with a password manager and two-factor authentication.

In an interview on the Easy Prey podcast, cybersecurity expert Roger Grimes explained why using a password manager is the one of the smartest, safest, and simplest ways to protect your accounts.

“The only password I have to remember is to log into my laptop” Grimes explains. “After that, I have to log into my password manager once, and you can even use multi-factor authentication for that. My life is so much easier. If someone tries to ‘social engineer’ me out of my password, they can’t because I don’t know it.”  

Get started boosting your security.

Here’s an article on the WhatIsMyIPAddress.com website that shows you the

leading password managers and provides great information on how to get the most out of using one. 

Read this article on how to set up two-factor authentication on your most important accounts. Learn how to add the extra layer of protection you need and want.

Follow the Easy Prey Podcast

The Easy Prey podcast has more than 200 episodes on a wide range of important topics regarding online and offline safety for you and your loved ones.

Related Articles

All
  • All
  • Easy Prey Podcast
  • General Topics
  • Home Computing
  • IP Addresses
  • Networking Basics: Learn How Networks Work
  • Online Privacy
  • Online Safety
  • Uncategorized
Selling a scam. How a scam works.

Selling the Scam.

Whereas a successful salesperson is good at selling a product, a successful con artist is good at...

[Read More]
Alan Castel talks about the psychology behind scams and how scammers exploit our brains.

The Psychology Behind Scams Preys on Basic Human Nature

It’s easy to stereotype the kind of people you think would fall for a scam. But scammers…

[Read More]
How to Validate the Authenticity of a Soldier's Claim

Key Questions to Validate the Authenticity of a Soldier’s Claim

Confirm military status by requesting to view a form of ID

[Read More]
Apple's Lockdown Mode provides additional security ... but with significatn drawbacks.

Should You Use Apple’s Lockdown Mode? Here’s What you Need to Know Before You Decide

Maybe you’ve heard of Apple’s Lockdown Mode feature and thought its promise of extra-strong protection for your…

[Read More]
Medical identity theft can have long-lasting, potentially hazardous consequences.

What You Need to Know about Medical Identity Theft (and What to Do if You’re a Victim)

If you’re like most people, you’re probably aware of the concept of identity theft. A criminal gets…

[Read More]
The IP command in Windows is used for managing network configurations and network-related tasks.

IP Commands for DOS/Windows

For those of us who aren’t technologically inclined, taking the time to learn about and understand the…

[Read More]