Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: added "recommended" to second factor bullet

...

  • The first factor is something you know, such as your password.
  • The second factor is something only you have, such as your mobile phone (recommended).


If your password is compromised through a phishing attack or other malicious means, a cybercriminal would also need your second factor to access your account.

...