Click to close the image preview

Showing results for 
Search instead for 
Do you mean 
The Latest from The Mozy Blog: What's new with Mozy?
A couple new updates have been released for the Windows and Mac clients as well as some new features in the latest Linux client. Check out our latest blogs for all the details!

April's Webinar: Protecting Your Data From Attack
April's webinar will be presented on Wednesday, 04/26 at 9AM PDT. Sign up today!

Looking for support?
Create a new post with your question and our community members and moderators will be happy to help answer it for you!



Two-Step Identification Procedure

I would strongly suggest a two-step identification procedure similar to google's procedure.


As of now, someone who gets access to my password (say, via keylogger or via insecure wifi) can gain access to my whole digital life. I find this rather scary.


Google procedures are here:


Over the long run, I plan to move all my senstive data to systems with two-step procedures. A plain password is not sufficient, as I learnt the hard way.





Thank you for the feedback.


You might look into custom encryption in the mean time. If they have your password, then can still get into the account, but if they try a restore if they don't have your encryption key phase (which should be different from your password) then it won't do them any good.



Status changed to: Being Discussed


Status changed to: Duplicate
Community Manager


For reference, another Idea Exchange post with the same request:


Two Step Verification for On-Line Access