April 17, 2019 By Shane Schick 2 min read

Smartphones running Android 7.0 and higher can now serve as two-factor authentication (2FA) tools as part of a Google 2FA strategy to boost security across its online services.

In a blog post published amid its annual Google Cloud conference in San Francisco last week, the company said turning devices into security keys is a way to help consumers and businesses avoid some of the risks around phishing schemes and other attempts by cybercriminals to steal usernames and passwords. Much like using a set of credentials in addition to a USB key, the Google 2FA approach combines something a user knows along with something they physically possess.

How to Get Started With Google 2FA

Those interested in using their Android smartphone as a security key can enroll via Google Play Services and add their account, as long as they have Bluetooth enabled on both their mobile device and their desktop.

Once this is done, anyone who receives an email, text message or anything else directing them to a bogus version of a Google-owned online service will likely realize what’s happening because the Google 2FA key won’t be required.

Google said the program is still in beta and noted that its Titan Security Key remains the best defense against phishing attacks. The company also suggested that those who choose its 2FA option ensure they have an additional backup security key in a safe place somewhere they can access if the need arises.

Looking Beyond 2FA to MFA

While Google’s smartphone-based security key may help thwart some phishing campaigns, and may be an improvement over the pairing of a password with an SMS key, it’s obviously limited to devices running Android.

Meanwhile, the growing movement of shopping, banking and other activities to online services may mean consumers and organizations need to think about additional layers of protection. IBM experts suggest that multifactor authentication can offer greater peace of mind by introducing context-based access, such as scanning a QR code, instead of entering a password at all. Biometric options such as fingerprint scanning offer another way to keep cybercriminals at bay.

More from

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today