security

Google To Automatically Enroll Users in Two-Step Authentication – TechDecisions


As cyberattacks continue to be disruptive to organizations and economies of all shapes and sizes, the tech industry is stepping up by making basic cybersecurity tools like multi-factor authentication widely available.

Now, Google plans to automatically enroll 150 million Google users in its two-step verification program and require 2 million YouTube users to turn the feature on, the company said in a recent blog post.

The company in May began automatically enrolling users in two-step verification if their accounts are property configured, and but now the company wants to enroll more users in its credential-securing feature.

Google said it is currently auto-enrolling users that have proper backup mechanisms in place to make a seamless transition to two-step verification.

According to the company, Google is working on technologies that reduce reliance on passwords and provide a secure and convenient experience for everyone.

And, the company is working with security key partners to provide over 10,000 high-risk users with free security keys, giving those users “the highest degree of sign-in security possible.”

In addition, Google is building security key capabilities into Android phones and its Google Smart Lock app on Apple devices.

“Today, over two billion devices around the world automatically support the strongest, most convenient 2SV technology available,” the company said in the blog post.

The company also highlighted its recently launched One Tap and a new family of Identity APIs called Google Identity Services which uses secure tokens – not passwords – to sign users into partner websites and apps like Reddit or Pinterest.

“With the new Google Identity Services, we’ve combined Google’s advanced security with easy sign in to deliver a convenient experience that also keeps users safe,” Google said in the blog. “These new services represent the future of authentication and protect against vulnerabilities like click-jacking, pixel tracking, and other web and app-based threats.”





READ SOURCE

Leave a Reply

This website uses cookies. By continuing to use this site, you accept our use of cookies.