System security is a top priority for any IT Admin. Ordinarily, the last frontier for end user security is the strength of their password. By implementing 2-step verification you can ensure their account is inaccessible to outsiders even if their password is somehow compromised.
2-Step verification utilizes the user’s mobile device to provide a one time use code to access to their account. In addition to being easy to implement, 2-step verification makes it nearly impossible for an intruder to access an account without physically possessing the mobile device.
The Gooru provides Tips, Tricks, and Tools for Gmail & Google Apps - sign up for their daily email at The Gooru.
The original version of this video can be found here.