Secure your Google account with 2-Step Verification

In a recent blog post I discussed the woes of password management and two tools for making password management easier. However, even with a good password management solution in place, it’s still easier than you think for someone to steal your password and gain access to your online accounts. This is particularly true because many of us are guilty of reusing passwords across different websites, meaning many of our online accounts become vulnerable if just one (usually less secure) account is compromised. One thing you can do to add an extra layer of security to your Google account is to implement 2-Step Verification. This will help prevent access to your Google account even if your password is compromised.

[bctt tweet=”It’s easier than you think for someone to steal your password & access your #Google account. Here’s how to safeguard yourself with 2-Step Verification.” username=”samvardanega”]

About Google 2-Step Verification

What is 2-Step Verification?

2-Step Verification provides a more secure way to confirm your identity when logging into your Google account. In order to login, you need to provide two different pieces of information:

  • Something you know – this is your password
  • Something you have – this is usually a one-time code or physical security key.

As such, even if an attacker identities the something you know, they cannot access your account unless they also have the something you have.

How does Google 2-Step Verification work?

Whenever you sign in to your Google account, you’ll be asked to enter your password as usual. You’ll then be asked for something else, such as a code sent to your phone via text, voice call, or the mobile app. Or, if you have a physical Security Key, you can insert it into your computer’s USB port.

Does that mean I have to enter the 2-Step Verification code every time I sign in?

The first time you sign in to a device with 2-Step Verification, you can choose not to use it again on that specific device. That means that any future logins on that device will only require your password. However, if your account is used to login on another device, the second step of verification will be needed. This means if your password is compromised, an attacker will not be able to use it to access your account.

What options do I have for receiving the 2-Step Verification code?

The something you have can be delivered to your mobile device via one of the following options:

  • Text message: The verification code is sent to your mobile phone via a text message.
  • Phone call: Google calls your mobile or landline phone with a verification code.
  • Google prompt: A prompt appears on your mobile device and you tap ‘Yes’ to sign in.
  • Google Authenticator app: This app generates verification codes, even when your device has no phone or data service. It is available for iOS and Android. You can learn more about the app here.

Another option for 2-Step Verification is to purchase a security key. This is a physical device that is inserted into your computer’s USB port. You can read more about security keys here.

[bctt tweet=”Did you know that there are lots of options for using 2-Step Verification with your #Google account?” username=”samvardanega”]

What happens if I lose my mobile device or don’t have it with me?

After you enable 2-Step Verification on your Google account, you can download or print a series of one-time backup codes. These can be used to access your account if you don’t have access to your mobile device or security key. You can also choose to add a backup phone to your account which can be used to receive codes if yours is not available.

Setting up 2-Step Verification on your Google account

Follow the steps below to setup 2-Step Verification on your Google account.
1. Visit and login with the account you want to enable the 2-Step Verification on.
2. Locate the Sign-in & security section, then click the Signing in to Google link

3. Click the 2-Step Verification section.

4. Click Get Started and then enter your password when prompted.
5. You will be asked if you want to use a prompt as your second factor for verification. This is a message that will pop-up on your mobile device asking you to tap ‘Yes’.
– If you want to use this method, check the device listed is yours, then click Try it now.
– If you would prefer to use another method, click Don’t use prompt.

Tip: You can easily change your second verification method later too.

6. If you choose Try it now, a prompt will appear on your mobile device. Tap Yes to confirm the sign-in.
Note: If you did not choose this option, skip ahead to step 7.

7. You will then be asked to choose another verification method, such as a phone number to receive a text message to. Check the number and click Send to send the code.

8. Enter the code sent to your device, then click Next.

9. Confirm that you want to enable 2-Step Verification by clicking Turn on.

10. You will then be taken to the 2-Step Verification Configuration screen. From here, you can change what you use as your second verification step (including downloading or printing your backup codes) and see the devices that do not need a second step to sign in on.

11. The first time you sign into a device using 2-Step Verification, you can choose the option Don’t ask again on this computer if you only want to use your password on that device for future logins.

[bctt tweet=”Here’s how to setup 2-Step Verification on your #Google account and keep your information safe even if your password is compromised” username=”samvardanega”]

If you’re not sure about using 2-Step Verification, sit back and think about all the information you store in your Google account. Would you really want that falling in to the wrong hands? Would you really want someone accessing your account and using it for malicious purposes against your friends and family? If you’ve answered ‘No’ to either of these questions, take a few minutes now to setup 2-Step Verification on all your Google accounts!

If you found this post helpful, you’ll love our online professional learning community, where you get access to Using Technology Better’s training content and expert trainers.

Bonus tip!
If you’re interested in trying out the Google Authenticator app, check out this video on how to set it up.

Related Post

The right ways to enable AI at work – Tips for IT Lead

In today’s fast-paced workplace, maximizing efficiency while minimizing time spent on repetitive tasks is crucial. However, many staff members may feel unsure about integrating AI effectively, leading to missed productivity opportunities. As the IT lead, you can guide your team in harnessing AI’s power to streamline operations and save time. By providing clear guidance and


Streamline Your Workflow: Upgrade to Microsoft Graph PowerShell now!

Are you wondering what to do now that Azure AD, Azure AD Preview and MSOnline PowerShell modules are officially deprecated? It’s time to upgrade to Microsoft Graph PowerShell for a seamless experience! Simplify Your Workflow with Microsoft Graph PowerShell With the official deprecation of Azure AD, Azure AD Preview, and MSOnline PowerShell modules Microsoft Graph


Embracing Technological Change: A Leadership Guide

In today’s fast-paced world, technological advancements are reshaping industries at an unprecedented rate. As leaders, it’s crucial to navigate these transformations effectively and inspire our teams not only to adapt but thrive. The challenge comes when we want to integrate the authentic use and integration of technology as part of this change. Here are three


How well do you use the
Apple Apps Google Workspace Microsoft 365
tools in your workplace?

Find out if you’re working with the tools OR if you’ve got the
tools working for you.

What Industry Are You In?

Using Apple Apps, Google Workspace or Microsoft 365?

What Type of user are you?

🫣 Entry User | 🤹 Skilled User | 👑 Elite User

Take the quiz to find out. 

Privacy Policy

Using Technology Better Privacy Commitment


We hold the privacy of your personal information in the highest regard.

Using Technology Better regards customer privacy as an important part of our relationship with our customers. The following privacy policy applies to all Using Technology Better users, and conforms to Internet privacy standards.

This policy will be continuously assessed against new technologies, business practices and our customers’ needs.

If you have questions or concerns regarding this statement, you should first contact the support team on our Contact Us Page.

Collection of Information

In order to use the Using Technology Better website, we may require information from you in order to provide the best service possible.

All correspondence may also be collected and stored, particularly in regard to sales, support and accounts, including Email.

Any information collected by Using Technology Better is collected via correspondence from you or your company. This may be via the telephone, Email, mail, fax or directly through our website.

Visitors and customers of will have their information shared back to DAIWABO INFORMATION SYSTEM CO., LTD. and DIS Service & Solution Co., Ltd.

Use of Collection Information

Any details collected from Using Technology Better customers is required in order to provide you with our

products and/or services, and a high level of customer service.

Correspondence is recorded in order to provide service references, and to assist in our staff development.

Web Site Use Information

Similar to other commercial Web sites, our Web sites utilize a standard technology called “cookies” (see explanation below, “What Are Cookies?”) and web server log files to collect information about how our Web site is used.

Information gathered through cookies and Web server logs may include the date and time of visits, the pages viewed, time spent at our Web site, and the Web sites visited just before and just after our Web site.

Storage of Collected Information

The security of your personal information is important to us. When you enter sensitive information (such as credit card numbers) on our website, we encrypt that information using secure socket layer technology (SSL).

When Credit Card details are collected, we simply pass them on in order to be processed as required. We never permanently store complete Credit Card details.

We follow generally accepted industry standards to protect the personal information submitted to us, both during transmission and once we receive it.

If you have any questions about security on our Website, you can email us at <ContactEmail>.

Access to Collected Information

If your personally identifiable information changes, or if you no longer desire our service, you may correct, update, delete or deactivate it by emailing us at <ContactEmail>.


If you purchase a product or service from us, we may request certain personally identifiable information from you.

You may be required to provide contact information such as:



Postal address

Your school or organisation

Financial information (such as credit card number, expiration date, name on card, card billing address).

We use this information for billing purposes and to fill your orders. If we have trouble processing an order, we will use this information to contact you.


Using Technology Better uses personally identifiable information for essential communications, such as


Accounts information

Critical service details.

We may also use this information for other purposes, including some promotional Emails.

If at any time a customer wishes not to receive such correspondence, they can request to be removed from any mailing lists by contacting support.

You will be notified when your personal information is collected by any third party that is not our agent/service provider, so you can make an informed choice as to whether or not to share your information with that party.

Third Parties

Using Technology Better may at its discretion use other third parties to provide essential services on our site or for our business processes.

We may share your details as necessary for the third party to provide that service.

These third parties are prohibited from using your personally identifiable information for any other purpose.

Using Technology Better does not share any information with third parties for any unknown or unrelated uses.

What Are Cookies?

A cookie is a very small text document, which often includes an anonymous unique identifier. When you visit a Web site, that site’s computer asks your computer for permission to store this file in a part of your hard drive specifically designated for cookies.

Each Web site can send its own cookie to your browser if your browser’s preferences allow it, but (to protect your privacy) your browser only permits a Web site to access the cookies it has already sent to you, not the cookies sent to you by other sites.

Browsers are usually set to accept cookies. However, if you would prefer not to receive cookies, you may alter the configuration of your browser to refuse cookies.

If you choose to have your browser refuse cookies, it is possible that some areas of our site will not function as effectively when viewed by the users.

A cookie cannot retrieve any other data from your hard drive or pass on computer viruses.

How Do We Use Information We Collect from Cookies?

As you visit and browse our Web site, the site uses cookies to differentiate you from other users. In some cases, we also use cookies to prevent you from having to log in more than is necessary for security.

Cookies, in conjunction with our Web server’s log files, allow us to calculate the aggregate number of people visiting our Web site and which parts of the site are most popular. This helps us gather feedback to constantly improve our Web site and better serve our clients.

Cookies do not allow us to gather any personal information about you and we do not intentionally store any personal information that your browser provided to us in your cookies.


We reserve the right to disclose your personally identifiable information as required by law and when we believe that disclosure is necessary to protect our rights and/or comply with a judicial proceeding, court order, or legal process served on our Website.


Links on the Using Technology Better site to external entities are not covered within this policy. The terms and conditions set out in this privacy statement only cover the domain name of

Changes to Privacy Policy

If we decide to change our privacy policy, we will post those changes to this privacy statement, and other places we deem appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.

We reserve the right to modify this privacy statement at any time, so please review it periodically. If we make material changes to this policy, we will not use the personal information you have submitted to us under this Privacy Policy in a manner that is materially inconsistent with this Privacy Policy, without your prior consent

Delivery Policy

Most goods are digitally delivered instantly via email.  Our services may be delivered either via an online medium or live in person.

For our online delivery see below.  For services delivered live onsite, please refer to our speaker agreement form which is emailed to you on confirmation of booking.

Refund Policy

We do not offer refunds or returns unless we cannot supply goods or services or the goods or services are not delivered as promised.

Australian law is the governing body for all work, goods and services supplied by Using Technology Better.

Marketing Release

Using Technology Better (UTB) may film, record, and photograph me (the results of which are the “Recordings”). UTB may also incorporate into any production(s) any separate content (e.g., quotes, testimonials, biographical information, profiles, photos, videos, sound recordings, artwork, etc.) I provide to UTB or approve in writing (“Materials”).


I grant to UTB an irrevocable, perpetual, worldwide, royalty-free license to, in its sole discretion, (i) edit, translate, and modify the Recordings and the Materials, (ii) attribute the Recordings and Materials to me by my name, age, and city and state of residence, (iii) incorporate the Recordings and the Materials into content to promote UTB, its programs, or products (“Content”), and (iv) publicly use, distribute, reproduce, create derivative works from, and perform/display the Content, and any excerpts thereof, in any language.

2. No Compensation.

I grant this permission without any financial or other obligation of any nature.


For any issues or concerns please contact us