Our Recommended VPNs
Chosen after real-world testing across speed, privacy, and streaming. Each ranking is independent — we buy every VPN at retail and test it ourselves.
Fastest speeds, audited no-logs, 6000+ servers
Unlimited devices, CleanWeb blocker, 100+ countries
Swiss privacy laws, open-source, free tier
Lifetime plans, 10 devices, ad blocker
We earn a commission when you click “Get” buttons, at no extra cost to you. Read our affiliate disclosure
Before You Start
Before enabling 2FA on your accounts, you'll need:
- An authenticator app installed on your phone. We recommend Authy (multi-device backup) or Google Authenticator (simple, free).
- A secure place to store backup codes — your password manager is ideal.
- 10-15 minutes to complete the most critical accounts.
Important: Always save your backup/recovery codes. If you lose your phone and don't have backup codes, you may be permanently locked out of your accounts.
Priority Order
Set up 2FA in this order — email first, because email is the recovery method for almost everything else:
- Email (Gmail, Outlook)
- Password Manager
- Cloud Storage (Google Drive, iCloud, Dropbox)
- Work Tools (Slack, GitHub, AWS)
- Financial Accounts
- Social Media
Gmail / Google Account
- Go to myaccount.google.com/security
- Under "How you sign in to Google," click 2-Step Verification
- Click Get Started
- Choose Authenticator app
- Scan the QR code with your authenticator app
- Enter the 6-digit code to verify
- Save the backup codes — Google gives you 10 one-time codes
Tip: Google also supports passkeys and security keys. After setting up your authenticator app, consider adding a passkey as your primary method and keeping the app as backup.
Microsoft / Outlook
- Go to account.microsoft.com/security
- Click Advanced security options
- Under "Additional security," click Turn on next to Two-step verification
- Follow the prompts to add the Microsoft Authenticator app
- Scan the QR code and verify with a test code
- Save the recovery code provided
Tip: Microsoft Authenticator supports passwordless sign-in for Microsoft accounts — you approve a push notification instead of typing a password.
Apple ID / iCloud
- On iPhone/iPad: Settings > [Your Name] > Sign-In & Security > Two-Factor Authentication
- On Mac: System Settings > [Your Name] > Sign-In & Security > Two-Factor Authentication
- Follow the prompts — Apple uses your trusted devices as the second factor
- Add a trusted phone number as backup
Note: Apple's 2FA sends codes to your trusted Apple devices. This is different from authenticator apps but is still effective.
GitHub
- Go to Settings > Password and authentication
- Under "Two-factor authentication," click Enable
- Choose Set up using an app
- Scan the QR code with your authenticator app
- Enter the verification code
- Download and save your recovery codes
- Optional: Add a security key (YubiKey) for phishing-resistant 2FA
Critical for developers: If you lose access to your GitHub 2FA without recovery codes, you may lose access to all your repositories. Store recovery codes securely.
Slack
- Click your profile photo > Profile
- Click More > Account settings (opens browser)
- Under "Two-Factor Authentication," click Expand
- Click Set Up Two-Factor Authentication
- Enter your Slack password, then scan the QR code
Note: This is per-workspace. If you're in multiple workspaces, enable it on each one.
AWS (Amazon Web Services)
- Sign in to the AWS Console
- Click your account name > Security credentials
- Under "Multi-factor authentication (MFA)," click Assign MFA device
- Choose Authenticator app
- Scan the QR code and enter two consecutive codes to verify
Critical: For AWS root accounts, also consider a hardware security key. Compromised AWS accounts can result in enormous charges.
Managing Backup Codes
Every service that offers 2FA provides backup codes. Here's how to manage them:
- Store in your password manager — Create a secure note for each service's backup codes
- Print a physical copy — Store in a safe or secure location at home
- Never store in plain text — Don't keep them in an unencrypted file or email draft
- Use and replace — When you use a backup code, generate new ones immediately
What About Passkeys?
Passkeys are the future of authentication — they replace both passwords and traditional 2FA with a single cryptographic credential stored on your device. In 2026, passkeys are supported by Google, Apple, Microsoft, GitHub, and many other services.
If a service offers passkeys, use them. They're more secure than passwords + authenticator app and more convenient. Keep your authenticator app as a backup method.
How We Verified
All setup instructions were tested and verified on current app/service versions in April 2026. Screenshots and steps may differ slightly as services update their interfaces. Security recommendations based on NIST SP 800-63B and FIDO Alliance guidelines.
Continue learning
Related Guides
How to Share Passwords Safely: Stop Using Slack and Email (2026)
Secure methods for sharing passwords, API keys, and credentials with teammates. Password manager sharing, Bitwarden Send, and one-time links.
Device Encryption Guide: Protect Your Data If Your Laptop Is Lost (2026)
How to enable full-disk encryption on Windows, Mac, iOS, and Android. Your data stays secure even if your device is stolen.
Endpoint Security for Remote Workers: Beyond Antivirus (2026)
Your devices are endpoints in the security chain. Modern endpoint protection goes beyond antivirus — here's what you need in 2026.
Was this guide helpful?
What's next
Keep exploring
Sources & Citations
- 1Google: Verification in 2 steps — support.google.com. https://support.google.com/accounts/answer/185839
- 2Microsoft: Set up multi-factor authentication — support.microsoft.com. https://support.microsoft.com/en-us/account-billing/set-up-an-authenticator-app
- 3FIDO Alliance: Passkeys — fidoalliance.org. https://fidoalliance.org/passkeys/
- 4NIST SP 800-63B: Digital Identity Guidelines — Authentication. https://csrc.nist.gov/publications/detail/sp/800-63b/final
- 5CISA: Implementing Strong Authentication. https://www.cisa.gov/mfa

