LinkedIn keeping hackers at bay with two-step verification

Users of the professional social-networking site now have the option to add two-step verification to their accounts, which is designed to add another layer to the sign-in process when logging in from a new or unknown device. Those who opt in will have to enter their regular password, plus a numeric code that is sent to their phone via SMS every time they log in. “Most Internet accounts that become compromised are illegitimately accessed from a new or unknown computer (or device),” LinkedIn’s Vincente Silveira wrote in a blog post last week. “When enabled, two-step verification makes it more difficult for unauthorized users to access your account, requiring them to have both your password and access to your mobile phone.” Two-step verification can be turned on using the site’s settings page for users’ security options. After the feature is enabled, the site will send the code upon sign-in once per device. A user will be notified via email each time his or her account is signed into using a new device. The changes come one week after Twitter introduced two-factor authentication following a series of recent hacks targeting high-profile businesses on the blogging site, and a year after LinkedIn was in fact hacked, forcing the enterprise social network to reset the passwords of affected accounts. The company did not confirm how many passwords were involved, though it reportedly affected about 6 million users. LinkedIn is not the only Internet service to have suffered a breach recently, prompting many of the tech world’s biggest firms to implement optional, two-factor authentication. Just last week, Evernote added the service, about three months after it too was hacked. Microsoft, Twitter, and Apple have all done the same. While two-factor login does add an extra layer of security, it is not a panacea, some security experts have said. With an email phishing attack, for instance, a hacker could fake a login page to ask for the code the user just received, it has been argued. Aside from two-factor logins, Google laid out several safe password tips for users to follow, though some of the advice was fairly basic. “Use a different password for each important service” and “make your password hard to guess,” the company said.]]>

You May Also Like

Check out these additional posts from Mind Your Business.

Choosing the Right Background Check Provider for Continuous Background Checks

With continuous background checks, the importance of selecting the right provider cannot be overstated. The decision to integrate continuous monitoring into an organization’s processes comes with the responsibility of choosing a background check provider that aligns seamlessly with the unique needs and values of the organization. Let’s explore the key considerations in selecting the ideal…
Read More

What are Continuous Background Checks?

Continuous background checks are a departure from traditional screening practices and are a paradigm shift in how companies vet their employees. Unlike the conventional one-and-done approach, continuous background checks involve regular, ongoing assessments of an individual’s criminal history and qualifications. Continuous background checks can be used at varying frequencies, ranging from daily to weekly or…
Read More

The Top Five Reasons to Run a Background Check

Running a background check is more than just a precaution; it’s a crucial step toward ensuring transparency, accountability, and peace of mind. Let’s explore why running various types of background checks is essential in various aspects of life.  Hiring the Right Candidates In the hiring process, running a background check is a cornerstone of pre-employment…
Read More

Quality and Precise Results, On Time!

Let us know about your screening needs to get a custom quote. We work with businesses big and small as well as the government. Which means we have a package of solutions for your organization as well.