How to Retrieve and Generate Google 2FA Backup Codes

We Keep you Connected

How to Retrieve and Generate Google 2FA Backup Codes

How to Retrieve and Generate Google 2FA Backup Codes
Your email has been sent
Learn how to retrieve your Google 2FA backup codes and how best to use them.
Two-factor authentication via SMS, which can be intercepted, can be a less-than-ideal security measure. Yet, some systems, such as banks, don’t support interaction with apps like Authy or Google Authenticator and insist on sending 2FA codes via SMS. For the more security-minded, this isn’t really a good option.
Fortunately, some services offer 2FA backup codes that can be used instead. Google is one such service. When you set up 2FA for Google, you are given the option to generate backup codes. You can use these codes instead of SMS 2FA. These backup codes work, and when you run out, you can always generate more. Here’s how.
Note: If you have joined Google’s Advanced Protection Program or use security keys with your account, you may not be able to generate backup codes.
Jump to:
If you didn’t print out your backup codes upon setting up 2FA, the first thing you need to do is retrieve them. To do that, you must:
Figure A
Once created, you may display your backup codes. You can then download them as a .txt file or print them directly. The list will also show you only those codes you have not used, as the rest will be listed as ALREADY USED.
SEE: Explore TechRepublic Premium’s password management policy.
For those that opt to download the .txt file, I suggest you encrypt that file. Don’t leave it hanging around, unprotected, on your local drive for prying eyes to sneak a peek. Also included in that file is your Gmail address associated with the account. I highly recommend you delete that line in the file on the off-chance someone does stumble upon the file and manages to open it.
The last thing you want is to make it easy for a bad actor to put two-and-two together and realize those codes are associated with that address. There is also a line that looks like this:
Need more? Visit https://g.co/2sv
I recommend deleting that line, as it could give away the secret of what those codes are for. Once you’ve deleted those lines, save and close the file. Encrypt it, and your codes are less likely to be seen by prying eyes.
In that same area where your backup codes appear, you’ll see a circle with an arrow (Figure B). Click that, and new backup codes will be generated.
Figure B
Here’s a tip: Only use nine of those codes, and consider the 10th your key to get more codes. This is especially true if you opt to not use a mobile app for Google 2FA. You don’t want to find yourself without that one last key, so you can log in and generate more.
2FA is not a perfect solution. But if you can avoid using sites and services that send 2FA codes via SMS — and if those sites in question start supporting mobile 2FA apps — you’ll be less likely to have your codes stolen and used against you. Even so, you might consider only using these Google codes for 2FA authentication. Use them wisely, and understand that when it comes to security, nothing is ever 100%.
Still not sure about using 2FA codes? Try out these authenticator apps:
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.
How to Retrieve and Generate Google 2FA Backup Codes
Your email has been sent
Your message has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
Microsoft is also running a grant competition for ideas on using AI training in community building.
Generative AI will be a game changer in cloud security, especially in common pain points like preventing threats, reducing toil from repetitive tasks, and bridging the cybersecurity talent gap.
Does your business need a payroll provider that offers international payroll services? Use our buyer’s guide to review the best solutions, from ADP to Oyster.
Get up and running with ChatGPT with this comprehensive cheat sheet. Learn everything from how to sign up for free to enterprise use cases, and start using ChatGPT quickly and effectively.
Looking for an alternative to monday.com? Our comprehensive list covers the best monday alternatives, their key features, pricing, pros, cons and more.
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.
Cybersecurity attacks are inevitable for modern businesses. Therefore, it is vital that businesses deploy countermeasures to mitigate the damage these attacks cause. This quick glossary from TechRepublic Premium explains the terminology behind the most common cybersecurity countermeasures. From the glossary: CHECKSUM Refers to a numerical value that is calculated based on the contents of the …
Properly managed, planned systems outages need not prove contentious or disruptive. With a little foresight, even scheduled service interruptions can be coordinated in ways that catch no one by surprise and minimize productivity issues. Check out the accompanying checklist from TechRepublic Premium to learn more about coordinating scheduled systems outages. From the checklist: CREATE A …
Stories of virus and malware infections, data loss, system compromises and unauthorized access dominate headlines, and your WordPress website may be contributing to the problem. WordPress is the most popular CMS in the world. According to Colorlib, WordPress is used by over 800 million websites worldwide. But unfortunately, that popularity also makes it one of …
In many ways, data has become the primary currency of modern organizations. It doesn’t matter whether you are a large business enterprise, SMB, government or nonprofit, the collection, management, protection and analysis of data is a determining factor in your overall success. This policy from TechRepublic Premium establishes an enterprise-wide framework for categorizing and classifying …

source

GET THE LATEST UPDATES, OFFERS, INFORMATION & MORE