2FA? OTP? Why do I need an app for that?

One hand holding smartphone while other hand types on laptop keyboard
The authenicator app on your smartphone generates a one-time code for the 2FA login

Two-factor authentication (2FA) is about boosting your inbox security by adding a second verification step to your email login process. And this second factor is a six-digit security code that you not only use to activate two-factor authentication, but also to log in once 2FA has been set up. This security code is also called an “OTP,” and it’s generated by an app that you install on your smartphone.

 

You may be interested in using mail.com’s new 2FA security feature, but aren’t quite sure about this OTP app – what it’s all about and which one to install. So we’re here to fill in any blanks and give you a few recommendations for suitable apps.

What does OTP mean?

The acronym “OTP stands for “one-time password” – which, logically enough, is a code or password that you can only use once before it expires. To be precise (which we always strive to be!), mail.com uses a “TOTP,” or “time-based one-time password” for our two-factor authentication process. This means that the password is only valid for a limited time, usually 30 seconds. If it’s not used within this window of time, it also expires and a new one is automatically generated by the system.

What kind of app do I need for 2FA?

For two-factor authentication, you need a six-digit OTP generated using a third-party app that you install on your mobile device. These apps go by several different names, like authenticator app, authentication app and OTP app. Their purpose is to generate the codes you need for login processes. So if you want to activate 2FA for your mail.com account, you must first have an authenticator app on your smartphone. You install it just as you would any other app: via the app store that you normally use on your phone.

Good to know: These authentication apps work without being connected to the internet, so once you have it installed you can generate a security code whenever you need one, even if you can’t connect to Wi-Fi or a cellular network.

Free authenticator apps

There are currently several reliable and secure authenticator apps available for you to download for free. The tech whizzes in our team have put together a list of their favorites for you to use on your Android or iOS smartphone (the links take you to the download page of the app in question):

Of course there are many other authentication apps out there to choose from. Simply go to your app store of choice and search for “authentication”, “authenticator”, or “OTP” to find an extensive selection. Or visit our Help Center page for additional suggestions.

We hope this post cleared up any questions you had about OTPs and authenticator apps. If you found it helpful, please give us a thumbs-up below!

Photo: Shutterstock

Posted in

App Password Security 2FA

18 people found this article helpful.

Related articles

What can I do if I have a problem with 2FA?

If you are like a lot of our users, you appreciate the extra security that 2FA gives your email account by requiring a second verification step at login. But what do you do if something goes wrong – like if you no longer have access to the “second factor” because of a problem with the device you use for authentication?
Man eating breakfast while using digital tablet and phone
Problems with 2FA? Your secret key will soon have you smiling again!
Don’t panic – it’s time to use your secret key. more

Posted in

2FA Security Password
7 people found this article helpful.

Ask the Expert: Secure passwords

Notice board with lots of notes tacked up including one with a password
What password security mistakes can you spot in this picture?
Welcome to our first ever “Ask the Expert” post! We’re joined by our email security expert Arne for a deep dive into the topic of passwords and online security. In an interview, he shares some do’s and don’ts about passwords and clears up some common misconceptions. more
25 people found this article helpful.

Checklist: your personal mail.com settings

Man typing on computer keyboard with word "Password?" appearing over his head
Forgot your password? Saved contact information speeds up the password recovery process
Is your email account as secure as it can be? You can help keep things safe through your personal settings. The personal data associated with your mail.com account can be found on the Home page of your mailbox under "My Account." This is where you go to enter a cell phone number so you can quickly recover your password. Or change your password if you think the old one is no longer secure. But there are a few more things you can do to boost the security of your email. Let’s take a look – we promise, it will only take a few minutes, and it could save you a lot of trouble down the road. more

Posted in

Inbox Security Password
51 people found this article helpful.

How secure is my password?

Metal lock on laptop keyboard
A strong password is like a lock protecting your email account
“Better safe than sorry” may be an old saying, but when it comes to your email password, it definitely still holds true. Because if an unauthorized person gains access to your email account, it can have serious consequences. more

Posted in

Security Password
20 people found this article helpful.

Why does mail.com want my address?

Female customer support agent wearing headset and talking to customer
If you contact customer support, your address is one way to verify your identity
When you signed up for your mail.com account, you might have asked yourself why we asked for your postal address. Are they going to send me advertising by snail mail? Give my address to third parties? Of course not! There’s a simple explanation, and it has to do with security. Hopefully this post will clear up the mystery of what we use your contact information for – and why you shouldn’t simply enter a fake address. more

Posted in

Security Password
23 people found this article helpful.

mail.com updates its email service with two-factor authentication and new spam recognition technology

Two-factor authentication is now available to all mail.com users worldwide. The security feature provides additional protection both to the mailbox and to the cloud. With active two-factor authentication, account data is safe from unauthorized access, even if the account password is lost or compromised. To log in, users who activate two-factor authentication in their account settings will be required to enter not only their personal password, but also a temporary 6-digit one-time code generated by an authentication app on their smartphone. more
152 people found this article helpful.

Americans see data disclosure by internet companies or authorities as one of biggest threats to data security

  • Majority of U.S. Americans concerned about hacker attacks
  • A quarter worry about burglary and damage to homes
  • Dangerous lack of awareness: More than one in ten respond to spam emails
more
6 people found this article helpful.

What is ransomware?

Red-on-black image of locked computer screen against a background of binary code
Do you know how to recognize and protect yourself against ransomware?
You may have seen headlines about ransomware attacks on institutions ranging from banks to hospitals to gas-pipelines. But what is ransomware, why is it dangerous, and can such attacks be prevented? Today, we answer your questions about ransomware. more
9 people found this article helpful.

How do I know if my email has been hacked?

Person wearing hoodie types on laptop while looking at screen with the words Hacker Attack

What happens if your email has been hacked?

How do you know if your email has been hacked or comprised? And if it happens, how can you block cybercriminals and regain control of your account? Discover the most common signs of a hacker attack and what to do about them. more

Posted in

Email Inbox Security
38 people found this article helpful.

Phishing emails: How to protect yourself

Image of fishhook hooking an @ symbol above a white computer keyboard

Be on the alert for phishing scams that aim to hook your personal information

You have probably heard about phishing scams – fraudulent emails designed to rob you of sensitive data. Because phishing is one of the most widespread forms of cybercrime, it’s important to learn how to recognize these scams so you don’t get caught in the net. more

Posted in

Phishing Security Spam
41 people found this article helpful.