When you use a backup code, put a check in the adjacent box so that you know it has already been used.Each backup code can only be used once.If you need to use a backup code to sign in, click Try another way to sign in when signing in to your Google account Watch a short video on Setting Up Backup Codes (you must be signed in to your St. You should consider carrying these backup codes in your wallet – when printed they are approximately the size of a business card. We recommend that you print out your codes, and then store them in a private but convenient location. Each backup code can be used only once, however, you can get a new set of codes any time.įor instructions on how to Create & View a set of backup codes, please visit /accounts/answer/1187538 They can be useful when you do not have your cell phone. This article explains how to setup the following second steps:īackup codes are 10-digit numbers that you print out and keep with you in case you lose access to other 2nd steps. We recommend setting up at least two alternate second steps. In these cases, you can use an alternate second step to sign in. There may be times when you do not have your primary second step (most often a cell phone). Use them wisely, and understand that when it comes to security, nothing is ever 100%.Alternate second steps help ensure that you can always access your account. Even so, you might consider only using these Google codes for 2FA authentication. But if you can avoid using sites and services that send 2FA codes via SMS - and if those sites in question start supporting mobile 2FA apps - you’ll be less likely to have your codes stolen and used against you. Not a perfect solutionĢFA is not a perfect solution. You don’t want to find yourself without that one last key, so you can log in and generate more. This is especially true if you opt to not use a mobile app for Google 2FA. Here’s a tip: Only use nine of those codes, and consider the 10th your key to get more codes. Click that, and new backup codes will be generated.įigure B You may print, download or generate new backup codes as indicated by the red box. In that same area where your backup codes appear, you’ll see a circle with an arrow ( Figure B). Encrypt it, and your codes are less likely to be seen by prying eyes. Once you’ve deleted those lines, save and close the file. I recommend deleting that line, as it could give away the secret of what those codes are for. There is also a line that looks like this: The last thing you want is to make it easy for a bad actor to put two-and-two together and realize those codes are associated with that address. I highly recommend you delete that line in the file on the off-chance someone does stumble upon the file and manages to open it. Also included in that file is your Gmail address associated with the account. Don’t leave it hanging around, unprotected, on your local drive for prying eyes to sneak a peek. txt file, I suggest you encrypt that file. IBM, ISC2 Offer Cybersecurity CertificateĪustralia, New Zealand Enterprises Spend Big on Security - But Will It Be Enough?įor those that opt to download the. Word of caution Must-read security coverage SEE: Explore TechRepublic Premium’s password management policy. The list will also show you only those codes you have not used, as the rest will be listed as ALREADY USED. Once created, you may display your backup codes.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |