A friend of mine — smart, careful, not the type to click on weird links — had her email account taken over last year. The attacker didn't guess her password. They didn't need to. Her credentials had leaked in a breach from a site she'd forgotten she even used. They logged in from halfway around the world, reset her banking password, and were done before she woke up.
Her password was fine. That wasn't the problem.
The problem was that a correct password was the only thing standing between a stranger and her entire digital life. And that's true for most people reading this right now.
The Setting Is Two-Factor Authentication — And You've Probably Dismissed It Already
Yes, you've heard of it. That doesn't mean you've turned it on everywhere that matters. Most people enable it on their bank and call it done, leaving their email, cloud storage, and social accounts wide open with password-only protection.
Here's why that's the wrong call: your email isn't just your email. It's the master key. Every "forgot my password?" link on every other site goes there. If someone owns your inbox, they own everything attached to it.
According to Google's Security Blog, simply adding a recovery phone number to a Google account blocks 100% of automated bot attacks and 99% of bulk phishing attacks. Two-factor authentication takes that protection further.
What It Actually Does (Without the Jargon)
When you log in somewhere, you currently prove who you are with one thing: something you know (your password). Two-factor authentication adds a second proof: something you have — usually your phone.
Even if a thief gets your password perfectly right, they're stopped cold without that second factor. The login just… fails. They're locked out, and you get an alert that someone tried.
It takes about three minutes to set up. You'll do it once and then barely notice it exists.
The Part Most Articles Get Wrong
Here's the counterintuitive thing almost nobody tells you: not all two-factor methods are equal, and the most popular one is also the weakest.
SMS text message codes — the "we just texted you a 6-digit code" approach — are better than nothing, but they have a real vulnerability called SIM swapping. An attacker calls your phone carrier, pretends to be you, and convinces them to transfer your number to a SIM card the attacker controls. Now those texts go to them.
According to the Federal Trade Commission, SIM swap scams have cost victims millions of dollars, often targeting people who thought they were protected by two-factor SMS.
The fix is to use an authenticator app instead of text messages. Google Authenticator, Authy, and Apple's built-in password manager all generate codes locally on your device, with no carrier involved. There's nothing to intercept. This is free, takes five extra minutes to set up versus SMS, and is dramatically more secure.
Where to Turn It On First
Not every account deserves the same urgency. Prioritize in this order:
- Your primary email account — Gmail, Outlook, Apple Mail. This is non-negotiable.
- Your password manager, if you use one. If someone gets in here, they get everything.
- Your phone carrier account itself — because of the SIM swap risk above.
- Financial accounts — bank, brokerage, PayPal, Venmo.
- Social media, especially if your accounts have large followings or are connected to business tools.
For each one: go to Settings → Security (or Privacy) → Two-Factor Authentication. Enable it. When given a choice, pick "Authenticator App" over "Text Message." Scan the QR code with your authenticator app. Done.
The Backup Codes Are Not Optional
Every service that offers two-factor will also give you a set of backup codes — a list of one-time-use numbers you can use if you lose your phone. Most people screenshot them, close the tab, and never think about them again.
Print them. Physically. Put them somewhere you'd look if your phone was stolen — a filing cabinet, a locked drawer, your wallet. This sounds paranoid until the day your phone dies overseas and you need to get into your email. A printed backup code is not paranoia; it's basic contingency planning.
The Honest Limitation
Two-factor authentication is not a magic shield. A sophisticated, targeted phishing attack can still defeat it — if you're tricked into typing both your password and your code into a fake site, the attacker can use both in real time before the code expires. This is called a real-time phishing relay, and it's happening more than most people realize.
The more durable solution is a physical security key (like a YubiKey), which is hardware-based and cryptographically tied to the actual website's domain — fakes can't use it. But that costs money and requires more setup, which puts it out of reach for casual users.
So: two-factor authentication via an authenticator app is the right move for almost everyone. It stops the vast majority of attacks. It just doesn't stop all of them. If you're a high-value target — journalist, activist, executive — the threat model is different and you should dig deeper.
For everyone else: turn it on today, use an app instead of texts, save your backup codes somewhere physical. That's it. You've just made yourself dramatically harder to compromise than 90% of people around you.
Sources:
- Google Security Blog
- Federal Trade Commission (SIM Swap Scams)






