Get a Pentest and security assessment of your IT network.

Cyber Security

Authy 2FA: Secure Your Accounts

TL;DR

Authy is a great Two-Factor Authentication (2FA) app, but it needs careful setup and backup to stay secure. This guide covers the best ways to use Authy, including device security, backups, and what to do if things go wrong.

1. Device Security

  1. Protect Your Phone: The biggest risk is losing your phone or it being stolen. Use a strong PIN, password, fingerprint lock, or Face ID on your device.
  2. Enable Authy’s Lock: Authy has its own PIN protection. Always enable this! It adds an extra layer of security if someone gets hold of your phone but doesn’t know your phone unlock code. You can find this in the Authy settings under ‘Security’.
  3. Regularly Check Connected Devices: Review the devices logged into Authy. Remove any you don’t recognise. Go to Settings > Account > Connected Devices.

2. Backups – Crucially Important

If you lose access to your phone, a backup is how you get back into your accounts. Authy offers several options:

  1. Cloud Backup (Recommended): Authy can securely store your 2FA data in the cloud. This is the easiest and most reliable method. Enable this in Settings > Account > Backups. You’ll need to create a master password – keep it safe!
  2. Local Backup: You can export your accounts as a JSON file. Store this file securely (e.g., on an encrypted USB drive, or in a password manager). Don’t store it on the same device as Authy itself. To create a backup go to Settings > Account > Backups and select ‘Export’.
  3. Regularly Test Your Backup: Don’t wait until disaster strikes! Practice restoring your accounts from your chosen backup method to make sure you know how, and that it works correctly.

3. Multiple Devices (Use with Caution)

Authy allows you to install the app on multiple devices. This can be convenient but increases risk.

  1. Limit Devices: Only use Authy on devices you fully trust and control.
  2. Keep Software Updated: Ensure Authy is updated on all your devices.

4. What to Do If Your Phone Is Lost or Stolen

  1. Remote Wipe (If Possible): If you have remote wipe capabilities for your phone, use them immediately.
  2. Change Master Password: If you used cloud backup, change your Authy master password immediately from a different device or computer. This will invalidate any backups on the lost/stolen phone.
  3. Restore From Backup: Use your local backup (JSON file) to restore your accounts on a new device.
  4. Contact Service Providers: For critical accounts, contact the service provider directly and explain the situation. They may have alternative recovery methods.

5. Account Recovery Codes

Many services provide one-time recovery codes when you enable 2FA. These are vital!

  1. Save Them Securely: Store these codes in a password manager or printed and kept in a safe place.
  2. Use Immediately If Needed: Once used, a recovery code is no longer valid.

6. Authy Token Management

Authy generates Time-based One-Time Passwords (TOTP). Here’s how to manage them:

  1. Adding Accounts: When adding an account, scan the QR code or manually enter the setup key provided by the service.
  2. Renaming Accounts: Give accounts descriptive names for easy identification.
  3. Deleting Accounts: Remove any accounts you no longer use.

7. Security Considerations

While Authy is secure, remember these points:

  • Phishing Attacks: Be wary of phishing emails or messages asking for your 2FA codes. Never share them with anyone!
  • Software Updates: Keep both Authy and your phone’s operating system updated to benefit from the latest security patches.
  • cyber security Best Practices: Use strong, unique passwords for all your accounts, and be cautious about clicking links in emails or messages.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation