Protect your business with 2-Step Verification (2024)

Set up 2-Step Verification

Next: Deploy 2-Step Verification

These articles are for Google Workspace administrators. Google Workspace users should go to Turn on 2-Step Verification.

You can use 2-Step Verification (2SV) to put an extra barrier between your business and cybercriminals who try to steal usernames and passwords to access business data.

Important: 2SV enforcement for admin accounts

To better protect your organization’s information, Google will soon require all administrator accounts to have 2SV enabled. Enforcement is now being implemented for some organizations with an Enterprise edition. In 2024, enforcement will gradually extend to all organizations with an Enterprise edition. You should enable 2SV for the admin accounts in your organizationbeforeGoogle enforces it. Be aware that:

  • Enforcement is rolling out over the next year. Super administrators will get a notification 60 days before enforcement.
  • Admins will be notified 30 days before the enforcement starts via email and mobile phone. During these 30 days, the Google-set 2SV enforcement policy will override any 2SV policies set by an organization.
  • During the notification period, when an admin signs in to their account, they’re reminded to enable 2SV by the mandatory date. If they fail to do so after 7 days, they will continue to see a reminder in the Admin console until they enable it.
  • Admins with Google Workspace editions where the 2SV enforcement policy is in place are unable to avoid it. If an admin is unable to enable 2SV, removing the user's admin rights is the only way to avoid being subject to enforcement rules.
  • Service Accounts are not required to have 2SV enabled, but the Admin account they are impersonating must be enrolled in 2SV.
  • You can review an admin's enforcement status in the Google Admin console. For the steps, go to Track users’ enrollment and add the 2-Step verification enforcement column.
  • New admins will have 30 days to enroll in 2SVbefore enforcement begins.
  • If an admin can't sign in after 2SV enforcement, follow the steps to recover an administrator account.

What is 2SV?

With 2SV,your users sign in to their account in two steps with something they know (their password) and something they have (their phone or a Security Key). Learnhow it works.

Secure your Google Workspace user accounts

Do small businesses need 2SV?

Cybercriminals target businesses of all sizes. If a hacker gets into your administrator account, they can see your email, documents, spreadsheets, financial records, and more.

A hacker could steal or guess a password, but they can’t reproduce something only you have.

2SV methods

When you set up 2SV, you choose the second verification step for your users.

Open all| Close all

Security keys

Protect your business with 2-Step Verification (1)Security keys are the most secure form of 2SV and protect against phishing threats. There are 2 types of security keys:

  • A hardware security key or a Titan Security Key
  • Your phone's built-in security key (available on phones running Android 7+ or iOS 10+)

When a user signs in to their Google Account, their device detects that the account has a security key. For the second verification step, the user signs in with their security key. Users connect their security key to their device by USB, Bluetooth, or NFC (Near Field Communication), depending on the type of key. Learn more about security keys.

Google prompt

Protect your business with 2-Step Verification (2)Users can set up their Android or Apple mobile devices to receive a sign-in prompt. When they sign in to their Google Account on their computer, they get a "Trying to sign in?" prompt on their mobile device. They simply confirm by tapping their mobile device. Signing in this way adds the security of2SV and is quicker than entering a verification code. Learn more about phone prompts.

Google Authenticator and other verification code generators

Protect your business with 2-Step Verification (3) Users generate one-time verification codes on a hardware token (small hardware device) or an app on their mobile device, such as Google Authenticator. The user enters the code to sign in to their computer and other devices, including the mobile device itself. Google Authenticator and other apps don't need an internet connection to generate codes.

2SVsupports software and hardware tokens that use the TOTP (Time-based One Time Password) standard.

Backup codes

Protect your business with 2-Step Verification (4)If a user doesn't have their mobile device or works in an area where they can't carry mobile devices, they can use backup codes for 2SV. Users can generate backup verification codes and print them ahead of time.

Text message or phone call

Protect your business with 2-Step Verification (5)Google sends a 2SV code to mobile devices in a text message or voice call.

Note: 2SV using local phone numbers is not currently supported for some domains in Nigeria and Ivory Coast, due to large volumes of account abuse in those countries. For information on whether your domain is eligible, please contact Support.

Passkeys

Protect your business with 2-Step Verification (6)If an admin has enabled skip password on a user's account, they can skip password sign-in challenges and instead use a passkey that incorporates first and second-factor authentication. With passkeys, users can sign in to their managed Google Account using their phone, a security key, or their computer’s screen lock. For details, go to Sign in with a passkey instead of a password.

Best practices for 2SV

Enforce 2SV for administrators and key users

You can make 2SV optional or required for your users. We recommend enforcing 2SV for your administrator account and users who work with your most important business information.

  • The administrator account is the most powerful account because it can delete users, reset passwords, and access all your data.
  • Users who work with sensitive data such as financial records and employee information should also use 2SV.
  • 2SV is the first line of defense thatcan cut account takeover by as much as 50%.

Consider using security keys in your business

Because security keys are the strongest 2SV method, consider using them in your business.

  • Security keys—The strongest 2SV method, and they don’t require users to enter codes. You can buy compatible security keys from a retailer you trust, or Titan Security Keys from the Google Store. Or your users can use their phone's built-in security key (available on phones running Android 7+ or iOS 10+).
  • Alternatives to security keys—If you decide not to use security keys, Google prompt or the Google Authenticator app are good alternatives. Google prompt provides a better user experience because users simply tap their device when prompted instead of entering a verification code.
  • Text messages are discouraged—They rely on external carrier networks and might be intercepted.
Next: Deploy 2-Step Verification

Was this helpful?

How can we improve it?

Need more help?

Try these next steps:

Post to the help community Get answers from community members Contact us Tell us more and we’ll help you get there

Start your free 14-day trial today

Professional email, online storage, shared calendars, video meetings and more. Start your free Google Workspace trial today.

Protect your business with 2-Step Verification (2024)
Top Articles
How To Protect Your Skin From Bleach And Chlorine In The Swimming Pool
Cremation and Social Security Death Benefits - Cremation Specialists
Swimgs Yuzzle Wuzzle Yups Wits Sadie Plant Tune 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Autumns Cow Dog Pig Tim Cook’s Birthday Buff Work It Out Wombats Pineview Playtime Chronicles Day Of The Dead The Alpha Baa Baa Twinkle
Craigslist Motorcycles Jacksonville Florida
Wausau Marketplace
Sam's Club Gas Price Hilliard
Best Transmission Service Margate
King Fields Mortuary
Mens Standard 7 Inch Printed Chappy Swim Trunks, Sardines Peachy
Video shows two planes collide while taxiing at airport | CNN
1-833-955-4522
Kylie And Stassie Kissing: A Deep Dive Into Their Friendship And Moments
Jbf Wichita Falls
Walgreens Alma School And Dynamite
Www Craigslist Madison Wi
Who is Jenny Popach? Everything to Know About The Girl Who Allegedly Broke Into the Hype House With Her Mom
Kentuky Fried Chicken Near Me
Move Relearner Infinite Fusion
Strange World Showtimes Near Savoy 16
Acurafinancialservices Com Home Page
Intel K vs KF vs F CPUs: What's the Difference?
Missing 2023 Showtimes Near Grand Theatres - Bismarck
James Ingram | Biography, Songs, Hits, & Cause of Death
Loopnet Properties For Sale
Ravens 24X7 Forum
Moonrise Time Tonight Near Me
Khatrimmaza
Wega Kit Filtros Fiat Cronos Argo 1.8 E-torq + Aceite 5w30 5l
Grandstand 13 Fenway
Southern Democrat vs. MAGA Republican: Why NC governor race is a defining contest for 2024
Greencastle Railcam
Compress PDF - quick, online, free
Tamilyogi Ponniyin Selvan
Skip The Games Ventura
Ludvigsen Mortuary Fremont Nebraska
Bismarck Mandan Mugshots
10 games with New Game Plus modes so good you simply have to play them twice
Telugu Moviez Wap Org
Craigslist Tulsa Ok Farm And Garden
Silive Obituary
Engr 2300 Osu
Peace Sign Drawing Reference
Victoria Vesce Playboy
Aloha Kitchen Florence Menu
Plumfund Reviews
Hughie Francis Foley – Marinermath
How to Do a Photoshoot in BitLife - Playbite
Puss In Boots: The Last Wish Showtimes Near Valdosta Cinemas
Craigslist Pets Lewiston Idaho
Prologistix Ein Number
Tenichtop
Island Vibes Cafe Exeter Nh
Latest Posts
Article information

Author: Francesca Jacobs Ret

Last Updated:

Views: 6234

Rating: 4.8 / 5 (68 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Francesca Jacobs Ret

Birthday: 1996-12-09

Address: Apt. 141 1406 Mitch Summit, New Teganshire, UT 82655-0699

Phone: +2296092334654

Job: Technology Architect

Hobby: Snowboarding, Scouting, Foreign language learning, Dowsing, Baton twirling, Sculpting, Cabaret

Introduction: My name is Francesca Jacobs Ret, I am a innocent, super, beautiful, charming, lucky, gentle, clever person who loves writing and wants to share my knowledge and understanding with you.