Users should aim to enable two-factor authentication (2FA) where possible. This dual-step verification process requires users to input not only a password and username but also a one-time code from devices such as mobile phones or secure tokens. These one-time codes are randomly generated by a 2FA system, therefore it is impossible for hackers to predict these codes. Having this extra layer of protection means reducing the risk of data being stolen by public password-sniffing hackers.
Sign up for CIO Asia eNewsletters.