*This post was updated in May 22. How does two-factor authentication work? Two-factor authentication, also commonly referred to as two-step verification, requires an

This post is the first in our new series on digital security and two-factor authentication. No one likes to think that their systems