With over 8 Million users working online on our services, ensuring information security is an important priority for us. Your Zoho.com account is the entry point for a bunch of collaboration, productivity and business apps from Zoho that not only help run your business, but also hold your data. Obviously, you would want to keep that entry point safe.
Keeping this in mind, we have added support for two step authentication to get into your Zoho account. In this age of phishing attacks and identity thefts, relying on login password alone does not guarantee security. No matter how strong or complex your primary password might be, your account stands the risk of a breach if your password happens to fall into the wrong hands.
Two Factor Authentication (TFA) provides an additional layer of security around your account. As it requires two successive factors – ‘something you know’ (your password) and ‘something you have access to’ (your mobile phone, for example), it helps greatly reduce account compromises due to phishing attacks and other online frauds.
Once TFA is enabled, you need to first login to your Zoho account with usual credentials. You will then receive a uniquely generated verification code to your phone either as a voice call or as an SMS text, which you should attend/enter to complete the login process. Alternatively, you can use the Google Authenticator app on your smart phones to generate the second factor code.
TFA is immediately available to all the users of Zoho and setting it up is quite straightforward. Access https://accounts.zoho.com/ and navigate to ‘Two Factor Authentication’ section and then follow the instructions available to carry out the set up process. If your Zoho account is part of ‘Zoho Business Organization’, the TFA can be enforced / controlled only by the organization administrator.
Optional, but highly recommended
Two Factor Authentication is completely optional. But, from security standpoint it is highly recommended. Security benefits of TFA far outweigh the minor inconvenience of having to authenticate through two successive stages.