CyberSecurity Awareness
About Lesson

Real-world example:
John’s Gmail password gets leaked in a data breach. But since he has 2FA, hackers also need the code sent to his phone—which they don’t have.

Common 2FA methods:

  • Text (SMS) codes

  • Authenticator apps (e.g., Google Authenticator, Authy)

  • Hardware tokens (e.g., YubiKey)

Best practice:
Avoid SMS-only 2FA if possible—SIM swapping is a real risk. Use authenticator apps instead.

Join the conversation