Categories: Google News

Google’s preferred sign-in method

Last year, the National Institute of Standards and Technology removed SMS two-factor authentication from its list of preferred authentication methods. Since then, Google has encouraged users to use prompts-based 2-Step Verification (2-SV) methods instead. Find out why:

Security was the main concern. According to Google, “This is being done because SMS text-message verifications are one-time codes that are more susceptible to phishing attempts.” Hackers can dupe network operators into redirecting the message to their phone. Even worse, there are numerous Android apps that can be used to capture SMS codes sent from banks to customers.

To defend against these threats, Google introduced 2-Step Verification in user accounts. If a user tries to log in to an account, Google will send a phone alert prompting that person to confirm his or her identity. Prompts-based 2-Step Verification (2-SV) sign-in is safer because the entire process occurs over an encrypted connection. In February 2017, Google improved the existing 2-SV prompts with additional information on the device, location and time of attempted sign-ins.

Google hasn’t confirmed ending support for SMS authentication but has already sent invitations urging 2-SV-SMS to switch to the prompts-based version. Users will be given the option of whether they want to retain the prompt-based sign-in. However, users who refuse to switch will receive follow-up notifications after six months.

Android users will enjoy a seamless transition because they will receive prompts without having to download an additional app. However, iOS users who rely on SMS for 2-Step Verification are required to install the Google Search app on their phone.

For any questions, get in touch with us. We’ll help you stay on top of the latest IT management and technology news.

Ron Pierce

Recent Posts

Secure, Not Stiff: Balancing Cybersecurity and Usability for Small Businesses

Small businesses can enhance cybersecurity without sacrificing usability by using password managers, MFA, and SSO.…

18 hours ago

Why Disaster Recovery Needs More Than Just a Backup Plan

When most small business owners think about protecting their data, they usually start with backups.…

2 days ago

Stop Downtime at the Door: Customized IT Support and Network Management for Manufacturers

Customized IT support and proactive network management reduce manufacturing downtime, optimize shop floor Wi-Fi, enhance…

4 days ago

Freedom to Focus: Why Month‑to‑Month Managed IT Beats Long‑Term Contracts

Flexible, month-to-month managed IT contracts offer businesses control, predictable costs, local support, robust cybersecurity, easy…

5 days ago

Transparency First: How Open IT Partnerships Build Trust and Long-Term Wins for SMBs

Transparency in IT partnerships builds SMB trust through clear SLAs, honest pricing, proactive reporting, local…

5 days ago

Compliance, Simplified: How Managed IT Services Keep Small Businesses Audit-Ready

Managed IT services by Trinity Solutions simplify compliance for small businesses by managing audits, documentation,…

6 days ago

This website uses cookies.