Two-Factor Authentication (2FA)
What two-factor authentication is, why it matters, and how to set it up on your accounts
Two-factor authentication (2FA) adds a second step when you sign in — after your password, you need a code or tap to prove it is really you. The three main types, ranked by security: hardware security keys (phishing-proof, like YubiKey), authenticator apps (recommended for most people — Microsoft Authenticator, Google Authenticator, Authy, KeePassXC, 1Password, Bitwarden), and SMS codes (better than nothing, but vulnerable to SIM swapping). Passkeys are the next evolution — they replace your password entirely with a biometric verification like a fingerprint or face scan, and they are phishing-resistant by design.
Set up 2FA on your Apple Account:
- Open System Settings and click your name at the top
- Click Sign-In & Security
- Click Two-Factor Authentication
- Click Turn On and follow the prompts
- Enter a trusted phone number and verify with the code sent to it
Apple uses your other Apple devices as the primary second factor, with your phone number as backup. Once enabled, you cannot turn it off after 14 days.
Set up 2FA on Google:
- Go to
myaccount.google.comand sign in - Click Security in the left sidebar
- Under "How you sign in to Google," click 2-Step Verification
- Click Get started and enter your password if prompted
- Choose your method — Authenticator app (scan the QR code), Google prompts (tap to approve on your phone), or Security key
- Complete the verification step
- Click Generate backup codes and save them somewhere safe
Passkeys on Mac:
Your Mac can store passkeys in iCloud Keychain, synced across all your Apple devices. When a site asks you to create a passkey, your Mac uses Touch ID to verify you. Passkeys created this way work in Safari, Chrome, and other browsers.
You can also store passkeys in a password manager instead of iCloud Keychain:
- KeePassXC — enable passkey support in KeePassXC Settings > Browser Integration > Enable passkeys. Passkeys are stored in your vault and work through the browser extension in Chrome, Firefox, and Edge.
- 1Password / Bitwarden — the browser extension intercepts the passkey prompt and offers to save it in your vault, making it available across platforms.
Recovery codes:
- Save recovery codes in your password manager or print them and keep them somewhere physically secure
- Never store them in a plain text file on your desktop
- Generate new codes periodically — each code works once, then it is used up
- Set up a backup phone number or register a second authenticator device
Frequently Asked Questions
What if I lose my phone?▾
This is why backup methods matter. Use your recovery codes to sign in, then set up 2FA on your new device. If you used Google Authenticator with cloud backup enabled or Authy with multi-device, your codes may transfer automatically. Otherwise, you will need recovery codes for each account. If you have no recovery codes and no backup method, you will need to go through the service's account recovery process, which can take days.
Is SMS-based 2FA safe?▾
It is significantly better than no 2FA, but it is the weakest option. SIM swapping attacks — where someone convinces your phone carrier to transfer your number — can intercept SMS codes. High-value targets (public figures, crypto holders, journalists) should avoid SMS-based 2FA. For most people, SMS 2FA still blocks the vast majority of attacks. Switch to an authenticator app when you can.
Do I need 2FA if I have a strong password?▾
Yes. A strong password protects you from guessing and brute force attacks, but not from phishing, data breaches, or keyloggers. If your password gets leaked in a breach (which happens regularly to major services), 2FA is the only thing stopping an attacker from using it. They are complementary protections, not alternatives.
What are recovery codes and where do I find them?▾
Recovery codes are one-time backup codes generated when you set up 2FA. They let you sign in when you cannot use your normal second factor. Find them in your account's security settings, usually near the 2FA setup page. Google: Security > 2-Step Verification > Backup codes. Microsoft: Security > Additional security options > Recovery code. Generate and save them before you need them.
Can I use the same authenticator app for all my accounts?▾
Yes. A single authenticator app (like Microsoft Authenticator or Authy) can hold codes for dozens of accounts across different services. Each account appears as a separate entry with its own rotating code. This is the recommended approach rather than using a different app per service.
What is a security key and do I need one?▾
A security key is a physical device (like a YubiKey) that plugs into USB or taps via NFC to verify your identity. It is the most secure form of 2FA because it is immune to phishing — the key cryptographically verifies you are on the real website, not a fake one. Most people are fine with an authenticator app, but security keys are worth considering if you handle sensitive data or want maximum protection.
What is the difference between a passkey and 2FA?▾
Traditional 2FA adds a second step after your password. A passkey replaces the password entirely — you sign in with just your fingerprint or face. Passkeys are technically more secure than most 2FA methods because they are phishing-resistant by design and there is no password to steal or leak.
Can I use passkeys and 2FA at the same time?▾
It depends on the service. Some services treat a passkey as your complete sign-in method (replacing both password and 2FA). Others let you use a passkey as a second factor alongside your password. Google, for example, lets you sign in with just a passkey, skipping the password and 2FA steps entirely.
What happens to my passkeys if I switch devices?▾
If your passkeys are stored in iCloud Keychain, they sync to your new Apple device automatically. On Android, they sync through your Google account. If you use a password manager like KeePassXC, 1Password, or Bitwarden, your passkeys are available anywhere the manager is installed. Windows Hello passkeys are device-specific unless you also save them in a cross-platform password manager.