Remove Instructional Remove Method Remove Phone
article thumbnail

How to transfer your Google Authenticator 2FA to a new phone

The Verge

They work by issuing an authentication code on your phone when somebody tries to access the account; if that person doesn’t have the code, they (or you) don’t get in. Because 2FA uses a key specific to your phone, if you lose or break your phone, you can’t simply reinstall the app on your new phone and go on from there.

Phone 113
article thumbnail

Here’s what to do if you give your information to a scammer

Mashable Tech

That means blocking their phone number if it happened over a call or text and their email if it was done over email. Many banks also have online reporting methods. All major wire transfer companies like MoneyGram and Western Union have fraud claim forms you can fill out and phone numbers you can contact.

Giving 88
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

7 Ways Nonprofits Can Automate Donor Retention

Nonprofit Tech for Good

By Christy Smaglio , Instructional Writer at Donor Perfect – a top-rated donor management system and fundraising platform for nonprofits. Here are seven excellent methods of increasing donor retention and how to automate them. What foolproof methods do you use to get your donors to stick around? Share in the comments below.

Retention 342
article thumbnail

The Art of Facilitating Meetings with Sticky Notes

Beth's Blog: How Nonprofits Can Use Social Media

Project Planning: Includes two methods, one for agile planning and the other for complex projects. Brainstorm: Methods for generating new ideas – recombining, adding, subtracting. Speaking of documentation, that’s where digital tools can come in handy – for example your mobile phone camera.

article thumbnail

How to use your phone as a two-factor authentication security key

The Verge

Google’s built-in security allows you to access your account by just hitting “Yes” or pressing your volume button after a pop-up appears on your phone. You can also use your phone as a secondary security key. Use your phone to sign in. Head into myaccount.google.com/security on Chrome and click on Use your phone to sign in.

Phone 64
article thumbnail

How to Clear Critical Data From Your Cell Phone Before You Get Rid of It

Tech Soup

we get new cell phones on average every 18 months. One of biggest risks we face is the critical data stored in our old phones that we get rid of. The good news is that it’s pretty easy to do a hard reset and clear mobile phones of personal information. from your cell phone, if your phone has one of those.

Phone 57
article thumbnail

Two SIM swappers phished a phone company so they could steal $16K in crypto

The Verge

They used those credentials to conduct unauthorized SIM swaps, redirecting their target’s phone number to bypass the two-factor authentication process that is supposed to protect accounts. According to the prosecutors, after performing the swap, Bryan instructed Milleson to transfer cryptocurrency valued at $16,847.47

Phone 66