A stolen password alone should not be enough to compromise your account. That's the entire promise of multi-factor authentication (MFA). Despite being widely supported, it remains the most commonly skipped security step.
This guide covers every major platform that remote IT workers touch, with exact steps for each.
Before You Start
Get an authenticator app first. You'll need it for most of these:
- Ente Auth — open-source, encrypted backup, recommended
- Google Authenticator — simple, works, no backup (risk)
- Authy — cloud backup, multi-device
- Bitwarden — handles TOTP codes alongside passwords (premium plan)
Key concepts:
- TOTP — Time-based One-Time Password. A 6-digit code that refreshes every 30 seconds. Generated by your authenticator app.
- FIDO2/Passkey — Phishing-resistant hardware or software key. Strongest option where available.
- SMS — One-time codes sent by text. Weakest option, but better than nothing.
Always use TOTP or hardware keys over SMS when available.
Gmail / Google Account
Google is often the root account for everything else. Protecting it is critical.
- Go to myaccount.google.com → Security
- Under "How you sign in to Google," click 2-Step Verification
- Click Get started
- You'll be asked to verify your identity first
- Scroll past "Google prompts" and click Authenticator app
- Click Set up authenticator → scan the QR code with your authenticator app
- Enter the 6-digit code to verify
- Click Turn on
Additional hardening:
- Go back to 2-Step Verification → scroll to Backup codes → generate and save these offline
- Consider adding a physical security key (YubiKey) as a second method
- Under Advanced Protection: if you're high-risk, enroll in Google's Advanced Protection Program
Cloudflare
Cloudflare controls your DNS — if compromised, an attacker can redirect your entire domain.
- Log into dash.cloudflare.com
- Click your profile picture (top right) → My Profile
- Click Authentication in the left sidebar
- Under Two-Factor Authentication, click Enable
- You'll see a QR code — scan it with your authenticator app
- Enter the 6-digit code and click Verify Code
- Save your backup codes — download or copy them to your password manager
Account security settings (also do these):
- Profile → Sessions → review active sessions, terminate unknown ones
- If using an API token in any app, go to My Profile → API Tokens → audit what exists
GitHub
GitHub hosts your code. An attacker with access can push malicious code or wipe repositories.
- Go to github.com → click your avatar → Settings
- In the left sidebar: Password and authentication
- Under "Two-factor authentication," click Enable two-factor authentication
- Choose Authenticator app (recommended over SMS)
- Scan the QR code with your authenticator app
- Enter the 6-digit code → Continue
- Download your recovery codes → save them in your password manager and a secure offline location
- Click I have saved my recovery codes → confirm
Additional GitHub security:
- Settings → SSH and GPG keys → review what's authorized; remove unknown keys
- Settings → Applications → review OAuth apps; revoke anything unrecognized
- For organizations: Org Settings → Authentication security → require 2FA for all members
Formspree
Formspree handles your contact form submissions — worth securing.
- Log into formspree.io
- Click your email/avatar → Account Settings
- Find the Security or Two-Factor Authentication section
- Enable TOTP-based 2FA
- Scan QR code, enter verification code
- Save backup codes
Microsoft 365
Microsoft 365 is often the most business-critical account in any remote team. MFA here is non-negotiable.
For Individual Users
- Go to mysignins.microsoft.com → Security info
- Click + Add sign-in method
- Select Authenticator app
- Click Add → choose "Use a different authenticator app" if not using Microsoft Authenticator
- Scan QR code with your app → click Next
- Enter the code shown → Next → Done
For Microsoft 365 Admins (Enabling for Everyone)
Modern method — Conditional Access (recommended for M365 Business Premium and above):
- Go to admin.microsoft.com → Security → Conditional Access
- Create a new policy requiring MFA for all users
- Set it to report-only first, then enforce after reviewing
Legacy method — Per-user MFA:
- admin.microsoft.com → Users → Active users
- Click Multi-factor authentication in the top menu
- Select all users → Enable
- Users will be prompted to set up MFA on next sign-in
Security Defaults (simplest for small orgs):
- Azure AD (Entra ID) → Properties → Manage Security Defaults
- Toggle to Enabled → Save
- This automatically enables MFA for all users and blocks legacy auth protocols
Apple ID
Apple ID controls device management, iCloud backup, Find My, and App Store purchases.
- Go to appleid.apple.com or Settings on iPhone → [Your Name]
- Tap Sign-In & Security
- Tap Two-Factor Authentication → Turn On
- Follow the prompts to verify a trusted phone number
- Apple sends verification codes to trusted devices — no separate authenticator app needed for basic use
For stronger Apple ID security:
- Settings → [Your Name] → Sign-In & Security → Account Recovery → set a recovery contact
- Use a strong, unique password (Bitwarden can generate this)
- Review trusted devices regularly: appleid.apple.com → Devices
Bank Accounts
Every bank does this differently, but the pattern is the same.
- Log into your bank's website → find Settings, Security, or Profile
- Look for: Two-factor authentication, Two-step verification, Login verification
- Enable TOTP (app-based) if available — many banks still only offer SMS
- If SMS is the only option, use it — it's still better than nothing
- Note the backup phone/email recovery options and keep them current
Banks that offer app-based TOTP: Check your bank's security settings. Large US banks (Chase, Bank of America, Wells Fargo) mostly use proprietary apps or SMS. Credit unions often support TOTP via third-party apps.
If your bank only supports SMS: that's their limitation. Use a dedicated phone number for banking SMS that isn't shared anywhere else.
Your Password Manager
This is the most important one — your password manager holds everything.
Bitwarden
- bitwarden.com → My Account → Security → Two-step Login
- Click Manage next to Authenticator App
- Scan QR code with your authenticator app
- Enter the 6-digit code → Enable
- Copy recovery code → store it somewhere separate from Bitwarden (written on paper, or in a truly offline location)
1Password
- Profile → More Actions → Two-Factor Authentication
- Click Set Up App → scan QR code
- Enter code → Confirm
- Remember: 1Password already requires your Secret Key, which functions as a second factor at the account level
KeePass
KeePass doesn't have cloud authentication — it uses a local key file as a second factor:
- File → Change Master Key
- Check "Key file / provider" → Create
- Save the key file to a different location than your database (e.g., a USB drive)
After Enabling MFA Everywhere
Test your recovery codes. Don't assume they work — actually test one on an account where you have a backup method.
Store backup codes properly:
- Print and store in a fireproof location, OR
- Store in your password manager in an encrypted note (not ideal if you're locked out of the password manager too), OR
- Use a second device as a recovery authenticator
The critical scenario: If you lose your phone and your only MFA device, can you still get in? Make sure the answer is yes before you need it.
Recommended MFA hierarchy:
- FIDO2 hardware key (YubiKey) — most secure, phishing-proof
- TOTP authenticator app — strong, widely supported
- Email-based OTP — acceptable fallback
- SMS — use only when nothing else is available
Enabling MFA on everything in this list takes about two hours. It's the highest-ROI security work you can do today.