Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Your Phone Can Work as Your Security Key

Tip of the Week: Your Phone Can Work as Your Security Key

If you’re like most people nowadays, your mobile phone is currently well within your reach (and that’s assuming you aren’t reading this blog on it). The fact that most people keep their phone on them at all times has greatly contributed to these devices becoming a part of any given work-related process. One major way is the implementation of two-factor authentication, which we’ll discuss as a part of this week’s tip.

As we begin, it is important that we acknowledge that the Android operating system has been granted FIDO2 certification. In other words, the FIDO (Fast IDentity Online) Alliance has given the Android OS their seal of approval in regard to the authentication standards that the Alliance has set.

What Does This Mean?

In very simple terms, any Android device running 7.0 or higher with the latest Google Chrome update installed can be used as part of a two-factor authentication strategy - more specifically, as a security key. This includes the support that FIDO2 offers for onboard fingerprint scanners as a means of identity authentication. Currently, this authentication standard is only supported by Android, with no indication of Apple devices incorporating it.

In no uncertain terms, this all means that passwords may soon be phased out.

Abandoning Passwords

Passwords have been the standardized form of authenticating one’s identity for quite some time, despite the potential issues that are present with them. How often have we seen just how many ways a determined cybercriminal has to obtain a password? Between insecure databases filled with credentials and unfortunately successful phishing schemes, millions of accounts have been exposed - and that isn’t even taking all the times an insecure password was guessed into account.

The biggest weakness that any password has is the fact that it can be shared at all, that someone other than the owner can use it. Over any other reason, this is why FIDO2 is likely to become as popular as it is expected to be. When was the last time you successfully shared a thumbprint with someone, after all? Furthermore, FIDO2 keeps all of the information that is pulled from its biometrics onboard the device, keeping it safe from being stolen on the Internet.

As an added bonus, FIDO2 won’t allow the user to input their fingerprint’s biometric data into websites that don’t have sufficient security measures in place.

How to Use Your Android Device as a FIDO2 Security Key

In order to leverage your Android device as a security key, you need to make sure that it meets a few benchmarks. First and foremost, you’ll need to be running at least Android 7.0, with the latest version of Chrome installed. You will also need to have Bluetooth activated, and a Google account with two-step verification enabled.

This is somewhat simple to do. Logging into your Google account, access the Security section. Here, you’ll find the option to activate 2-Step Verification. After a short process, your smartphone will work as a security key.

Authenticating Google Sign-Ins with Your Phone

As long as you have enabled both Bluetooth and Location on your mobile device, any Google service you try to access will prompt you to confirm the sign-in attempt via your phone. This process is exceptionally simple - all you have to do is press Yes on your phone and wait. Once you’ve done so, you can confidently access your Google account, securely. As more developers adopt FIDO2, this enhanced security will only appear more often.

What do you think of this new authentication method? Share your impressions in the comments! While you’re there, let us know if there are any other tips you’d like us to cover!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Gadgets Tech Term Saving Money Holiday Social Media Chrome Virtualization Automation Microsoft Office Managed IT Services Managed Service Artificial Intelligence Facebook Operating System Cybercrime Computers BYOD Wi-Fi Mobile Device Management Networking IT Support Hacking Health Internet of Things Alert Spam Office 365 Telephone Systems Remote Managed Service Provider Information Technology Information Covid-19 Bandwidth Social Engineering Mobility Router Recovery Employer-Employee Relationship BDR Remote Monitoring Application Password Money App History Encryption Applications Big Data Data Breach Human Resources Law Enforcement Mobile Computing How To Mobile Office Managed IT Apps Data Storage Patch Management Office Tips Training Blockchain VPN Paperless Office Government Remote Computing Private Cloud HaaS IT solutions Entertainment Website Budget Bring Your Own Device Data Management Work/Life Balance Vulnerability Wireless Windows 7 Word Google Drive Gmail Servers Settings Avoiding Downtime Two-factor Authentication Flexibility Data Security Marketing Infrastructure WiFi Voice over Internet Protocol Mouse Save Time User Error USB Meetings Cleaning Data Protection Risk Management Hacker Conferencing End of Support Scam Education Physical Security The Internet of Things Lithium-ion battery Safety Sports HIPAA Redundancy Vendor Software as a Service Vendor Management Telephone System Keyboard Staff Managed Services Firewall Machine Learning Display Connectivity Remote Work Virtual Reality Apple Employee/Employer Relationship Social RMM Printer Computing Bluetooth Value Augmented Reality Fraud Data storage Electronic Medical Records Automobile Spam Blocking Remote Worker Wearable Technology Digital Signage Hiring/Firing Retail Cryptocurrency Hard Drives Computing Infrastructure IT Consultant Going Green Instant Messaging Robot Excel Comparison Humor Biometrics Virtual Desktop Battery Procurement Net Neutrality Shadow IT Workplace Strategy CES Legal Business Intelligence DDoS Help Desk Audit Internet Exlporer Worker Business Technology Content Management Printing Access Control IT Management SharePoint PDF Virtual Assistant Botnet Authentication IT Plan Managed Services Provider Customer Service Database Proactive IT Environment Unsupported Software Best Practice Fax Server Remote Workers Virus Update YouTube Charger Processor Black Market Unified Threat Management Computer Accessories SaaS Compliance Google Docs OneNote Computer Care Identity Theft Hard Drive Current Events Document Management Telephony Solid State Drive Wireless Technology Samsung Network Congestion How to Downtime eWaste Password Management Ergonomics Tablets Password Manager Skype Files Smartwatch Multi-Factor Security Data loss OLED Chromecast Entrepreneur Development Twitter PCI DSS Outlook Virtual Machine Leadership Troubleshooting Search Engine Printer Server Uninterrupted Power Supply Shortcut NIST 2FA Business Mangement Start Menu Fiber Optics Colocation Employee Messaging Trending Screen Mirroring Cabling Loyalty Cost Management Smart Tech Social Networking Addiction Policy Amazon Frequently Asked Questions Hypervisor Monitor Books Windows 10s Dark mode Recycling Mobile Trend Micro SMS Cast Default App Wiring Practices Emergency Cache Procedure Amazon Web Services Tip of the week Saving Time Reputation webinar Streaming Media Running Cable Public Cloud Google Search Tech Support Employer Employee Relationship Safe Mode dark theme Memory Content Criminal Professional Services Shopping Hosted Computing AI Techology IT Infrastructure Laptop Assessment GDPR Wireless Internet FinTech Online Shopping Windows Server 2008 Customers Bing File Sharing Audiobook Tools Social Network Inventory Specifications Investment Touchpad Television Camera Wire Employees Science Evernote Employee/Employer Relationships Consultant Advertising Travel ISP Analytics Windows 365 Politics Video Conferencing Millennials ROI Public Computer Printers Notifications Distributed Denial of Service Transportation Customer Relationship Management Smart Office Sales Wireless Charging Regulations Bitcoin Best Available Shortcuts Computer Fan Cryptomining Rootkit Point of Sale Analyitcs Personal WIndows 7 Programming Supply Chain Management Workforce Virtual Private Network Benefits Monitoring Cables Batteries Relocation Workers FENG Windows 8.1 Digitize Nanotechnology Video Games Telecommuting Windows Server 2008 R2 IBM Antivirus Project Management Smart Technology Customer relationships Windows 8 Worker Commute Cortana Flash User Manufacturing PowerPoint Windows Media Player IT service Email Best Practices Experience Digital Signature IT Assessment Scalability Software Tips Supercomputer Warranty HVAC Computer Tips Tablet Business Owner Google Apps Sync Managed IT Service Emails Security Cameras Managing Stress Biometric Security NarrowBand Domains Virtual CIO Analysis OneDrive Devices Peripheral Search Administrator Cameras IaaS Two Factor Authentication Maintenance Enterprise Content Management Digital Security Cameras Using Data iPhone Netflix Root Cause Analysis 5G MSP Bloatware Accountants Copiers Thought Leadership Quick Tip Credit Cards HBO Knowledge Music Microchip

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code