{"id":2205,"date":"2022-06-30T11:59:52","date_gmt":"2022-06-30T08:59:52","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=2205"},"modified":"2025-08-02T01:30:42","modified_gmt":"2025-08-01T22:30:42","slug":"google-authenticator-backup","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/google-authenticator-backup\/","title":{"rendered":"How to Backup Google Authenticator or Transfer It to a New Phone"},"content":{"rendered":"\n<p>Our regular readers know that we strongly recommend applying two-step verification wherever it\u2019s possible. In the contemporary world, where database leaks are a standing affair, two-step authentication is not an option, it is, in fact, a must. If you use two-factor verification, an intruder would need to get both the unique password you came up with, and the gadget, which produces the verification codes, to break into your account. Thus, two-factor authentication protects from <a href=\"https:\/\/www.protectimus.com\/blog\/brute-force-attack\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">brute force<\/a>, <a href=\"https:\/\/www.protectimus.com\/blog\/keylogger\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">keyloggers<\/a>, most cases of <a href=\"https:\/\/www.protectimus.com\/blog\/7-tips-from-phishing-scams\/\">phishing<\/a> and <a href=\"https:\/\/www.protectimus.com\/blog\/social-engineering-why-it-works\/\">social engineering<\/a>. It also complicates <a href=\"https:\/\/www.protectimus.com\/blog\/mitm-prevention-and-detection\/\">man-in-the-middle<\/a> and <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/man-in-the-browser\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">man-in-the-browser<\/a> attacks.<\/p>\n\n\n\n<p>So why two-factor verification is still unpopular? Sure, it creates an extra step to take to log in, but most users omit it not because of this extra time and effort, but because they are afraid of losing access to their credentials if something goes wrong with their authentication devices.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cAs the world is increasingly interconnected, everyone shares the responsibility of securing cyberspace.\u201d<\/p>\n\n\n\n<p>\u2013 <a href=\"https:\/\/www.linkedin.com\/in\/newtonlee\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Newton Lee, Counterterrorism and Cybersecurity: Total Information Awareness<\/a><\/p>\n<\/blockquote>\n\n\n\n<p>From all available options of one-time passwords generation or delivery (SMS, emails, hardware and software tokens) most people choose Google Authenticator or other similar applications like Authy, <a href=\"https:\/\/www.protectimus.com\/protectimus-smart\">Protectimus Smart<\/a> etc. Operating principle is pretty much the same for all the software OTP tokens &#8211; they generate authentication codes for logging into your account right on your smartphone.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-text-color has-background wp-element-button\" href=\"https:\/\/www.protectimus.com\/token\/slim\/\" style=\"border-radius:15px;color:#000000;background-color:#83d07d\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Buy Hardware Google Authenticator for $29.99<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>It\u2019s very convenient to use the smartphone for two-factor verification, but there are always these nagging questions: What do you do if you lose the smartphone which generates your one-time passwords? What occurs if you switch smartphones, do you lose the entire account? How do you transfer Google Authenticator to a new phone? In this article, we will answer these nagging questions and help you protect your invaluable personal data.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/how-does-2-factor-authentication-work\/\">How does 2-factor authentication work?<\/a><br><a name=\"Google backup codes\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3 ways to backup Google Authenticator<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Backup codes<\/strong><\/h3>\n\n\n\n<p>Google, as well as some of the other websites where you can protect your user account with two-step authentication, provides backup codes. These are the one-use codes that allow you to login into your account if you lose access to your OTP token. After you use a backup code once it\u2019s gone for good. Most people print out these Google Authenticator backup codes and keep them at hand.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"451\" height=\"579\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-Backup-codes.png\" alt=\"Google Authnticator backup codes\" class=\"wp-image-2206\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-Backup-codes.png 451w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-Backup-codes-234x300.png 234w\" sizes=\"auto, (max-width: 451px) 100vw, 451px\" \/><\/figure><\/div>\n\n\n<p>It is imperative to understand that Google Authenticator is a multi-token, thus you can enroll many tokens for various websites using one app. Some of these websites provide backup codes, and a user can gain access to these websites if his\/her smartphone is lost. But what do you do with the websites which do not support backup codes?<\/p>\n\n\n\n<p>Another point against Google Authenticator backup codes is &#8211; they are as secure as a password written down on a paper. An intruder can easily copy them if they are in physical vicinity and use them to gain access to your account. Granted, the intruder will have to be among your peers and know the user password, but you know&#8230; things happen.<\/p>\n\n\n\n<p>Other things that you might want to keep in mind when it comes to printed out backup codes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You do not have them at hand at all times<\/li>\n\n\n\n<li>You can lose the paper or destroy it by mistake<\/li>\n\n\n\n<li>Only a few services provide them<\/li>\n<\/ul>\n\n\n\n<p>Google Authenticator backup codes have their perks, but you have to be ready for the drawbacks as well.<br><a name=\"making screenshots of the secret keys\"><\/a><br><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/mobile-authentication-pros-and-cons\/\">Mobile Authentication Pros and Cons<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Saving screenshots of the secret keys<\/strong><\/h3>\n\n\n\n<p>This is by far the easiest way to never lose access to your account. When you first set up your Google Authenticator simply make a screenshot of the barcode with the secret key. Keep the screenshot very secure though, if someone in your vicinity finds it they can access your data. Please, mind, if it really happens and someone steals your secret key, they will still need to know your user password, so <a href=\"https:\/\/www.protectimus.com\/blog\/how-to-choose-and-use-strong-passwords\/\">make sure it\u2019s not a simple combination to guess<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"475\" height=\"558\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-QR-code.png\" alt=\"Google Authenticator QR code\" class=\"wp-image-2208\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-QR-code.png 475w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-QR-code-255x300.png 255w\" sizes=\"auto, (max-width: 475px) 100vw, 475px\" \/><\/figure><\/div>\n\n\n<p><br><a name=\"Protectimus Slim NFC hardware token\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Programmable hardware token<\/strong><\/h3>\n\n\n\n<p>Created as a more secure alternative to the authentication apps, hardware tokens <a href=\"https:\/\/www.protectimus.com\/token\/slim\/\" title=\"\">Protectimus Slim<\/a> can be used with Google, Facebook, GitHub, Dropbox etc. These tokens are easily programmed with an application for Android with NFC support.<\/p>\n\n\n\n<p>The token looks like a credit card and can be carried with you effortlessly. So you\u2019ll always have an alternative source of <a href=\"https:\/\/www.protectimus.com\/blog\/otp-generation-algorithms-and-token-types\/\">one-time passwords<\/a> on all times, for example, if your smartphone battery is out of charge or you\u2019ve reset the phone or deleted the token accidentally.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/06\/Protectimus-Slim-NFC-token-100kb.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"648\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/06\/Protectimus-Slim-NFC-token-100kb.jpg\" alt=\"Hardware OTP token Protectimus Slim NFC OTP token\" class=\"wp-image-4218\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/06\/Protectimus-Slim-NFC-token-100kb.jpg 1200w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/06\/Protectimus-Slim-NFC-token-100kb-300x162.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/06\/Protectimus-Slim-NFC-token-100kb-768x415.jpg 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/06\/Protectimus-Slim-NFC-token-100kb-1024x553.jpg 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/06\/Protectimus-Slim-NFC-token-100kb-610x329.jpg 610w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/a><\/figure>\n\n\n\n<p>The hardware token is far more secure than a backup code on paper or a screenshot of the key &#8211; extracting the secret key from the token is absolutely impossible. Protectimus Slim NFC allows for unlimited reprogramming, so every time you change a token on a service you can simply reprogram it and stay protected.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button aligncenter is-style-fill\"><a class=\"wp-block-button__link has-text-color has-background wp-element-button\" href=\"https:\/\/www.protectimus.com\/token\/slim\/\" style=\"border-radius:15px;color:#000000;background-color:#ff6363\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Use this token and forget the Google Authenticator backup problems<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>The main drawback here is that one token allows for one secret key only.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/hardware-or-software-token-which-one-to-choose\/\">Hardware or Software Token \u2013 Which One to Choose?<\/a><br><a name=\"transfer Google Authenticator to another phone\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to transfer Google Authenticator to a new phone<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left\"><strong>Android<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>1. Use a built-in Google Authenticator feature<\/strong> <strong>Transfer Accounts<\/strong><\/h4>\n\n\n\n<p>If you use Google Authenticator on Android smartphone, now there is an easier way to transfer it to a new phone. We are talking about a brand new &#8220;Transfer accounts&#8221; feature added to Google Authenticator recently. Unfortunately, this feature is available only for Android phones so far. If you use an iPhone, please, see the instructions in the next paragraph or <a href=\"https:\/\/www.protectimus.com\/blog\/how-to-transfer-google-authenticator-to-new-iphone\/\">here<\/a>.<\/p>\n\n\n\n<p>There is no need to turn off two-factor authentication on all your accounts and activate it again. It&#8217;s enough to tap one button on the Google Authenticator on your old phone, the app will generate a QR code, and then you&#8217;ll need to scan this QR code with the Google Authenticator application on your new Android phone. That&#8217;s it, all the tokens will be moved.<\/p>\n\n\n\n<p>Here is a step-by-step guide for your convenience:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Download and install <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.apps.authenticator2&amp;hl=en\" target=\"_blank\" rel=\"noreferrer noopener\">Google Authenticator<\/a> application on your new smartphone.<\/li>\n\n\n\n<li>Open Google Authenticator on your old Android phone.<\/li>\n\n\n\n<li>Tap the menu button at the top-right of the app and choose Transfer accounts.<\/li>\n\n\n\n<li>Choose Export accounts.<\/li>\n\n\n\n<li>Select accounts you&#8217;d like to transfer to a new phone and tap Next. You have to scan this QR code with the Google Authenticator app on your new phone.<\/li>\n\n\n\n<li>Now open Google Authenticator on your new Android phone.<\/li>\n\n\n\n<li>Tap the menu button at the top-right of the app and choose Transfer accounts.<\/li>\n\n\n\n<li>Choose Import accounts.<\/li>\n\n\n\n<li>Scan the QR code you have on your old phone. The tokens you&#8217;ve selected will be transferred.<\/li>\n<\/ol>\n\n\n\n<p>Besides, you&#8217;ll see a notification &#8220;Accounts were recently exported&#8221; in your old app. Pay attention to this message. If it wasn&#8217;t you, who moved the Google Authenticator tokens to a new phone, take actions. Switch all your tokens in all your accounts to new.<\/p>\n\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img size-large is-resized\"><img decoding=\"async\" class=\"wp-image-6630 aligncenter\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/google-authenticator-transfer-to-android-576x1024.jpg\" alt=\"Google Authenticator transfer to Android\" width=\"300\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/google-authenticator-transfer-to-android-576x1024.jpg 576w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/google-authenticator-transfer-to-android-169x300.jpg 169w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/google-authenticator-transfer-to-android-610x1084.jpg 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/google-authenticator-transfer-to-android.jpg 720w\" sizes=\"(max-width: 576px) 100vw, 576px\" \/><\/figure>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>2. Manually Extract Your Credentials [Root Only]<\/strong><\/h4>\n\n\n\n<figure class=\"wp-block-table is-style-regular\"><table><tbody><tr><td><span style=\"color: #ff0000;\"><em>Note:<\/em><\/span> <em>There are many ways to manually transfer Google Authenticator if you have an Android smartphone with root access to it. We do <strong>not<\/strong> recommend using them though. Getting root access can significantly damage the security of your apps and make the device prone to getting viruses and errors.<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>This is a more time and effort consuming way to transfer Google Authenticator key to the other smartphone. It requires you to have root access to the smartphones.<\/p>\n\n\n\n<p>To extract the secret keys manually you need to give adb root access, this is easily done with an app like <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=eu.chainfire.adbd\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">[root] adbd Insecure<\/a> if you\u2019ve got stock ROM. And in case you happen to have custom ROM you might already have the necessary root access adb, so no additional apps are needed.<\/p>\n\n\n\n<p>Set adb onto insecure mode with the application or directly, connect the smartphone to your PC or laptop and copy the Google Authenticator databases to the computer using the commands.<\/p>\n\n\n\n<p>This is the pathname:<\/p>\n\n\n\n<p>adb pull \/data\/data\/com.google.android.apps.authenticator2\/databases\/databases<\/p>\n\n\n\n<p>After the file is copied you can open it and see the keys using these <a href=\"http:\/\/www.sqlite.org\/download.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">sqlite editor<\/a> commands:<\/p>\n\n\n\n<p>sqlite3 .\/databases<\/p>\n\n\n\n<p>select * from accounts;<\/p>\n\n\n\n<p>Now you have your secret keys and can add them to your new device.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> Twitter Two-Factor<a href=\"https:\/\/www.protectimus.com\/blog\/twitter-two-factor-authentication\/\"> Authentication in Details<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left\"><strong>iPhone<\/strong><\/h3>\n<\/div><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>1. Move Authenticator to a different phone using Google account settings<\/strong><\/h4>\n\n\n\n<p><em>NOTE: You will transfer only the Google token this way. This method works for Android phones as well.<\/em> <\/p>\n\n\n\n<p>With Google, it is pretty straightforward to transfer the authenticator and all the secret keys within it to another smartphone. All you\u2019ve got to do is go to the <a href=\"https:\/\/accounts.google.com\/b\/0\/SmsAuthConfig\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">two-step verification page<\/a>, click the &#8220;Get started&#8221; button, enter your password to verify it&#8217;s you, and click the \u201cChange phone\u201d button. Then either scan the QR or barcode, or put in the secret key on the other gadget manually. That\u2019s it.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"680\" height=\"524\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-Change-Phone.png\" alt=\"Google Authenticator Chang Phone function\" class=\"wp-image-2207\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-Change-Phone.png 680w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-Change-Phone-300x231.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-Change-Phone-610x470.png 610w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/figure><\/div>\n\n\n<p>This works only with the Google account, the other accounts where you use Google Authenticator for two-step authentication might not support this option. You will transfer only the Google token this way. So you might want to try the next two options instead.<br><a name=\"shut off the two-factor verification\"><\/a><br><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/google-auth-without-passwords\/\">Will Google\u2019s Authentication without Passwords Be Safe?<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>2. Disable &amp; Re-enable Two-Factor Authentication<\/strong><\/h4>\n\n\n\n<p>Disabling two-step verification is pretty easy if you still have your old smartphone. It\u2019s usually required to enter the OTP from the currently used token to disable two-factor authentication on any account. To disable 2FA for a while, just click the \u201cTurn Off 2-Step Verification\u201d, \u201cDelete the token\u201d, \u201cDisable 2-step verification\u201d or similar button, depending on the service you use. You&#8217;ll find it at the two-step verification page in security settings.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"745\" height=\"546\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-Turn-Off.png\" alt=\"Google Authenticator Turn Off function\" class=\"wp-image-2209\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-Turn-Off.png 745w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-Turn-Off-300x220.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2017\/12\/Google-Authenticator-Turn-Off-610x447.png 610w\" sizes=\"auto, (max-width: 745px) 100vw, 745px\" \/><\/figure><\/div>\n\n\n<p>Then add the authenticator application to your new gadget and follow the usual steps to set up Google Authenticator on the new phone.<br><a name=\"extract the Google Authenticator data manually\"><\/a><br><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/online-skimming\/\">What is Online Skimming and How to Avoid It<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusions<\/strong><\/h2>\n\n\n\n<p>Two-phase authentication is a reliable and reasonable way to shield your invaluable personal data. Whether you use a hardware token or apps like Google Authenticator or Protectimus Smart, you now know how to stay safe even if you change devices or lose your smartphone.<\/p>\n\n\n\n<p>We showed you easy ways like <a href=\"#Google backup codes\">Google backup codes<\/a> and <a href=\"#making screenshots of the secret keys\">making screenshots of the secret keys<\/a>. And we showed you more secure option like the <a href=\"#Protectimus Slim NFC hardware token\">Protectimus Slim NFC hardware token<\/a>.<\/p>\n\n\n\n<p>You also know now how to <a href=\"#extract the Google Authenticator data manually\">extract the Google Authenticator data manually<\/a>, <a href=\"#transfer Google Authenticator to another phone\">transfer Google Authenticator to another phone<\/a> and even <a href=\"#shut off the two-factor verification\">shut off the two-factor verification<\/a> if you happen to need to.<\/p>\n\n\n\n<p>So now you do not have any excuses not to protect your info better. All that is left to do is come up with proper user passwords which are not the name of your cat!<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background wp-element-button\" href=\"https:\/\/www.protectimus.com\/token\/slim\/\" style=\"color:#000000;background-color:#66aaff\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Order Protectimus Slim NFC and forget the GA backup pain forever<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Read more<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/remote-work\/\">Remote Work: How to Transition Team to Working From Home During the COVID-19 Pandemic<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/digital-security-risks-fintech\/\">10 Steps to Eliminate Digital Security Risks in Fintech Project<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/the-most-common-ways-of-credit-card-fraud\/\">Credit Card Fraud \u2013 Most Common Ways<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/ransomware-to-pay-or-not-to-pay\/\">Ransomware \u2013 to Pay or Not to Pay<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/malvertising\/\">Malvertising: Can It Be Stopped?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/biometric-authentication-pros-and-cons\/\">Biometric Authentication Pros and Cons<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/social-engineering-against-2fa\/\">Social Engineering Against 2FA: New Tricks<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/totp-tokens-protectimus-slim-nfc-faq\/\">TOTP Tokens Protectimus Slim NFC: FAQ<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/vpn-two-factor-authentication\/\">Securing VPN with Two-Factor Authentication<\/a><\/li>\n<\/ul>\n\n\n\n<p><script>$zoho.salesiq.ready=function(embedinfo){$zoho.salesiq.tracking.off();}<\/script><\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Our regular readers know that we strongly recommend applying two-step verification wherever it\u2019s possible. In the contemporary world, where database leaks are a standing affair, two-step authentication is not an option, it is, in fact, a must. If you use two-factor verification, an intruder would need to get both the unique password you came up [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":4319,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[3,15],"tags":[16,202,118,346,230,120,10,335,139,99],"class_list":["post-2205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering","category-rd","tag-2fa","tag-cybersecurity","tag-data-protection","tag-google-authenticator","tag-information-security","tag-multifactor-authentication","tag-otp","tag-protectimus-slim-nfc-en","tag-tokens","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/2205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=2205"}],"version-history":[{"count":45,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/2205\/revisions"}],"predecessor-version":[{"id":9075,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/2205\/revisions\/9075"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4319"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=2205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=2205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=2205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}