How to protect your Google account with two-step verification (updated 2025)

Last update: 16/08/2025

  • Turn on two-step verification and choose secure methods like Passkeys or Google Notifications.
  • Set up alternatives: Authenticator, SMS/Call, QR and backup codes for emergencies.
  • Avoid phishing and SIM swapping risks by using security keys and not sharing codes.
two step verification

Protect your Google account goes far beyond choosing a strong password. Phishing attacks, credential theft, and human error are still common. That's why two-step verification (2SV) —also called two-factor authentication—adds a second check to confirm that the person trying to log in is really you.

After activating two-step verification, you will be able to log in in two ways: with your password plus a second step, or directly with a passkey. Depending on the context, Google may display different authentication prompts to facilitate access while keeping potential intruders at bay.

What is two-step verification and how does it protect you?

 

Two-step verification adds an extra layer to your securityIn addition to the password, you'll need to confirm your identity with an additional method. If you use a passkey, that second step is skipped because the passkey itself proves that you own the device. Unlike passwords, passkeys exist only on your devices and can't be written down or accidentally handed out.

When you log in with a password, Google may ask you for a second specific step to better protect your account.That second step may vary depending on your device, your location, your login habits, and the security options you have enabled.

This approach Prevents an attacker who has stolen your password from entering your accountEven if you know the password, you'd need to confirm the second factor (your phone, your security key, your biometrics, or your code), which greatly complicates any unauthorized access attempt.

Two-step verification on Google

How to enable two-step verification on your Google Account

Setting up two-step verification is simple and fast, and it is advisable to do so as soon as possible to close the doors to unauthorized access.

  1. Open your Google Account from the browser or the corresponding app.
  2. Enter the security area: This may appear as “Security & Login” or “Security & Access” depending on the interface.
  3. In the “How do I sign in to Google” or “How do I access Google” section?, select “Turn on two-step verification.”
  4. Follow the steps on the screen to set your preferred method and complete activation.
Exclusive content - Click Here  How to Fix Error 0x80070006 in Windows 11: Complete Guide

Important- If your account is for work, school, or another managed group, the steps may vary or activation may be restricted. If you can't enable it, contact the administrator of your organization.

Once you activate two-step verification, you will have different confirmation pathsIf you choose to log in with a password, you'll need to complete a second step; if you use a passkey, that second step is automatically validated with your device.

Google Notifications: Quick and Easy

Google notifications are the recommended method if you don't use access keysIt's more convenient to tap "Yes" on a push notification than to type a numeric code.

You will receive these push notifications on Android phones where you're signed in with your Google account, and on iPhone if you accessed your account through apps like Gmail, Google Photos, YouTube, or Google Play.

  • If it was you, tap “Yes” to approve the login.
  • If it wasn't you, tap “No” to block the attempt immediately.

To add an extra layer of security, Google may ask you for your PIN or other additional confirmation. before completing access.

two step verification

Other verification methods you can configure

It is convenient to have alternatives Configured if you want more protection against phishing, can't receive notifications, or lose your phone. Below, we'll review all the available options and their purpose.

Access keys (passkeys) and hardware security keys

The access keys are a modern and more secure alternative to the passwordInstead of remembering a password, you log in with your fingerprint, facial recognition, or your device's unlock method (such as a PIN). You can create a passcode on your phone, computer, or even a compatible hardware security key.

Hardware security keys are small physical devices that you connect to your phone, tablet, or computer. They serve to verify that it is you trying to enter, and provide a very robust defense against phishing attacks.

Exclusive content - Click Here  How to trim audio in Google Slides

Against attempts to steal passwords or other data, access keys and hardware security keys protect your Google account from the most common scamsPlus, you don't need to type or remember anything: they're fast and save across your devices. And if you use your Google Account to sync them, you can access them on trusted, linked devices.

Code Apps: Google Authenticator and others

The verification code apps (such as Google Authenticator) generate one-time passwords that you can enter even if you don't have an internet connection or mobile coverage. They're ideal for confirming your identity when traveling or without data coverage.

To use Authenticator with GoogleFirst, enable two-step verification, and when you add the method, choose to configure using a QR code or secret key. You'll need to enter the temporary code generated by the app on the login screen. You can get started at http://www.google.com/2step.

These are some of the Authenticator's most useful features that facilitate management:

  • Multiple account support.
  • Easy setup via QR code.
  • Sync codes with your Google account so you can recover them if you change devices.
  • Time-based (TOTP) and counter-based (HOTP) code generation.
  • Transfer accounts between devices by scanning a QR code.

Codes by SMS or voice call

You can also receive a 6-digit code in your phone number By text message or voice call, depending on the method you choose. Just type it in on the login screen.

Warning: Although any second factor improves security, SMS codes or call are more vulnerable to phone number-based attacks (e.g., SIM skimming). Do not share these codes with anyone and remember that Google will not ask you for codes per call.

QR code verification

In some cases, Google may ask you to scan a QR code with your mobile phone. to verify your identity or confirm your phone number, a procedure less prone to number-related abuse.

  1. Scan the QR code that appears on your computer with your mobile phone. and follow the instructions to securely verify the number.
  2. Return to the computer to complete the process. when your phone tells you to.
Exclusive content - Click Here  How to mass delete links in Google Sheets

If you don't want to verify yourself every time on your personal computer, select the "Don't ask me again on this computer" or "Don't ask me again on this device" option when you log in. This way, on that specific device, you won't be asked to take the second step for future logins.

use it wisely: Only check this box on computers you use frequently and don't share with others. Avoid using this option on public or shared work computers.

Two-step verification on Google

When to choose each second-step method

  • If you want maximum protection and comfortOpt for access keys (passkeys). They're fast, reduce phishing, and save you from having to type passwords every day.
  • If you can't use passkeysGoogle notifications are a great alternative: you can approve with one tap, and they also help against phone number-related attacks.
  • If you travel or work without coverageA code app like Google Authenticator gives you network independence. Make sure you have backups or sync them so you don't lose them.
  • If you just want a simple and universal methodSMS or calls work almost anywhere, but they're less secure; use them as a backup, not as your primary option.
  • For emergencies or loss of mobile phoneSave backup codes. And if Google asks you for a QR code to verify your number, complete the process from your phone and return to your computer to finish.

Related Resources

The help itself of Google and its security guides They delve into each method, compatibility requirements, and purchasing steps for hardware security keys. Keep your methods up to date and periodically check that you can still access them with at least two alternative options.

Learn to Correctly combine passkeys, notifications, Authenticator, SMS/calls, QR and backup codes It will give you the optimal balance between convenience and security. With a good initial setup and some best practices, your account will be protected against most everyday attacks without complicating your life.