Home Invites Blogs Careers Chat Events Forums Groups Members News Photos Polls Singles Videos
Home > Blogs > Post Content

Moving security beyond passwords (387 hits)

Note: my mother's password was recently obtained for her gmail account, and then a malicious email sent to all her contacts. See my next blog on this subject as well. In particular, if this recent hack of connectplatform was able to obtain your BIA password, this could lead to future problems.

Monday, September 20, 2010 2:14 AM
Posted by Travis McCoy, Product Manager, Google Security Team

Entering your username and password on a standard website gives you access to everything from your email and bank accounts to your favorite social networking site. Your passwords possess a lot of power, so it's critical to keep them from falling into the wrong hands. Unfortunately, we often find that passwords are the weakest link in the security chain. Keeping track of many passwords is a pain, and unfortunately accounts are regularly compromised when passwords are too weak, are reused across websites, or when people are tricked into sharing their password with someone untrustworthy. These are difficult industry problems to solve, and when re-thinking the traditional username/password design, we wanted to do more.

As we explained today on our Google Enterprise Blog, we've developed an option to add two-step verification to Google Apps accounts. When signing in, Google will send a verification code to your phone, or let you generate one yourself using an application on your Android, BlackBerry or iPhone device. Entering this code, in addition to a normal password, gives us a strong indication that the person signing in is actually you. This new feature significantly improves the security of your Google Account, as it requires not only something you know: your username and password, but also something that only you should have: your phone. Even if someone has stolen your password, they'll need more than that to access your account.
Posted By: Adam Fate
Tuesday, October 26th 2010 at 11:12AM
You can also click here to view all posts by this author...

Report obscenity | post comment
Share |
Please Login To Post Comments...
Email:
Password:

 
More From This Author
Separation of Powers During the Forty- Fourth Presidency and Beyond
Unaccompanied Alien Children: An Overview
Improper Disclosure of Non-Public Information
This is antithetical to the core values of the FBI and the Department of Justice
Based on these findings, the report concluded:
FBI Agent Peter Strzok in Text to Lisa Page: ‘We’ll Stop’ Trump from Becoming President
Kim Kardashian West opens up about 'mission' to free Alice Johnson in exclusive interview
Your guns are on the ballot this November.
Forward This Blog Entry!
Blogs Home

(Advertise Here)
Who's Online
>> more | invite 
Black America Resources
100 Black Men of America
www.100blackmen.org

Black America's Political Action Committee (BAMPAC)
www.bampac.org

Black America Study
www.blackamericastudy.com

Black America Web
www.blackamericaweb.com

CNN Black In America Special
www.cnn.com/blackinamerica

NUL State of Black America Report
www.nul.org

Most Popular Bloggers
agnes levine has logged 24937 blog subscribers!
reginald culpepper has logged 11958 blog subscribers!
miisrael bride has logged 8141 blog subscribers!
tanisha grant has logged 5210 blog subscribers!
rickey johnson has logged 4385 blog subscribers!
>> more | add 
Latest Jobs
Analyst, Service Desk with Front Range Community College in Longmont, CO.
Director of Health Services with Lawrence Academy in Groton, MA.
Professional Counselor- Apply by 2/2/2026 with State of Connecticut, Executive Branch in Montville, CT.
Environmental Trainee - 260115-0196ES-001 - Apply by 2/4/26 with State of Connecticut, Executive Branch in Hartford, CT, CT.
Customs and Border Protection Officer Recruitment Webinar – February 11th with U.S. Customs and Border Protection in Buffalo, NY.
>> more | add