One of the loudest buzzwords heard these days within the business computing environment is SECURITY. And the number one method to prevent a security breach is the use of multi-factor (MFA) or two-step authentication.
The most common practice in the MFA arena is to use SMS texting to receive an authentication code. When prompted, you enter the code into the field provided and voilà! The problem with this is that hackers are now SIM swapping or hijacking your mobile phone. When they’re successful, the hackers can request and receive a security code to access your account, lock you out of your own account, and wreak havoc with your life.
The best way around this is to use an authenticator app. Google has one, Microsoft has one, and there are popular third-party authenticator apps, such as Authy. They all work with any of your online accounts, but you should find one and use it!
As a Microsoft-centric technician, my preference is to use Microsoft Authenticator. It provides security codes for all Microsoft accounts either free and business, Google/Gmail, Reddit, Facebook, and so on. The easiest account to access with Authenticator is your Office 365 account – a balloon pops up on your mobile device and you simply tap it to authenticate.
When your devices are managed through Intune and Enterprise, Mobility + Security (EMS), then you have to have permission to use the app first. In my case, the Touch ID biometric thumb reader on my iPhone provides quick access to the Authenticator app itself, as well as access to any other Microsoft apps on the device.
It takes some getting used to, however getting hacked is not an option.