- Influencers are being used to share 2FA messages in the United Kingdom
- The NCSC is using social networks to help protect against fraud and scams.
- Social networks accounts share comedy sketches and informative videos
The National Cyber Security Center of the United Kingdom has become influential people to run the voice about the importance of two factors authentication through the power of social networks.
The campaign is part of the 2024 stop of former Prime Minister Rishi Sunak! Think about the fraud initiative that seeks to spread awareness about fraud and online scams.
Comedians and personal finance influencers have been organizing sketches and advice videos to share on social networks with the aim of entertaining and educating
2fa goes viral
A tosquidvids sketch sees a group of criminals trying to hack an account, with all classical piracy films, such as the Matrix-Esque code, and technological idiots were incorrectly used that include “Dringing a Logic Bomb” and “copying the blockchine”.
The sketch even sees the group successfully guess a password that uses the NCSC three random words guide to create a safe password (in this case ‘bulldogslafeadjalfrezi47?’) With two numbers, a mixture of higher and lowercase letters, and a special character.
However, the group stops dry when they find a 2FA notice, with one of the criminals that says “as long as it has a two -step verification, we are not further, I do not believe.” And the other replies: “quite fair. I suppose that is the end of the movie really.”
An NCSC spokesman said The registration“To boost public awareness about the crucial benefits of allowing two steps verification in their most important accounts, we have associated with popular influential people on social networks to amplify this vital message and encourage a broader audience to adopt safe online habits.”
The authentication of two factors and multifactor authentication are ways of making the accounts safer. It works with a code sent to a separate device when you log in that must be entered before granting access. Biometry is also used, such as a fingerprint recording or facial recognition scans, as well as dedicated authenticator applications.