Two-Factor Authentication Audit: Securing Your Important Accounts
Two-factor authentication (2FA) is one of the most effective security measures available. But it's only as good as your implementation.
An audit ensures your important accounts are protected and that you won't lock yourself out.
What to Audit
1. Which accounts have 2FA enabled?
Priority accounts (enable 2FA immediately if missing):
- Email (especially your primary/recovery email)
- Password manager
- Banking and financial accounts
- Social media
- Cloud storage
- Domain registrar
- Hosting providers
2. What type of 2FA?
From strongest to weakest:
- Hardware keys (YubiKey, etc.): Best protection, immune to phishing
- Authenticator apps (Authy, Google Authenticator): Strong, widely supported
- SMS codes: Better than nothing, but vulnerable to SIM swapping
- Email codes: Weakest, depends on email security
Upgrade SMS-based 2FA to authenticator apps where possible.
3. Are recovery codes stored safely?
Recovery codes let you regain access if you lose your 2FA device. They should be:
- Stored offline (printed or in a safe)
- Not in your password manager (if that's what they're recovering)
- Not in cloud storage that requires 2FA to access
Common Problems
Lost phone: Your authenticator app is gone. Without recovery codes, you're locked out.
New phone: Did you transfer your authenticator app properly? Many people don't.
Single point of failure: All 2FA on one device that could be lost, stolen, or broken.
Outdated backup codes: Used some, didn't generate new ones.
The Audit Process
- List accounts with 2FA (check your password manager)
- Verify each one works (log out and log back in)
- Check recovery options (codes stored, backup methods set)
- Upgrade weak 2FA (SMS to authenticator app)
- Enable 2FA on unprotected priority accounts
Authenticator App Tips
Authy: Allows cloud backup and multi-device sync. Convenient but slightly less secure.
Google Authenticator: No backup. If you lose your phone, you need recovery codes.
1Password, Bitwarden: Can store TOTP codes. Convenient but puts eggs in one basket.
Hardware keys: Buy two. Register both. Keep one as backup.
How Often
Every 6 months. More frequently if you've changed phones or had security concerns.
Add it to your tasks. We'll remind you to verify your security is actually working.