- Influencers are used to share messaging 2FA in the United Kingdom
- The NCSC uses social media to help protect against fraud and scams
- Social media accounts share comedy sketches and informative videos
The National Cyber Security Center of the United Kingdom turned to influencers to pass the word on the importance of two-fact factors through the power of social media.
The campaign is part of the judgment of former Prime Minister Rishi Sunak in 2024! Think Fraud Initiative which seeks to make known online fraud and scams.
Personal actors and influencers have formed sketches and advice videos to share on social networks in order to entertain and educate
2fa becomes viral
A sketch of Thesquidvids sees a group of criminals trying to hack an account, with all the theaters of conventional hacking film such as the matrix code which tumbles on the screen and wrongly of technological idioms, including the “drop in a logical bomb” and the “copy of the blockchain”.
The sketch even sees the group successfully guess a password that uses the three random words of the NCSC to develop a secure password (in this case ‘Bulldogslaloadjalfrezi47?’) With two numbers, a mixture of higher and tiny letters and a special character.
However, the group is arrested in their footsteps when they meet an invite 2FA, with one of the criminals saying “as long as it has a two -step verification, we do not get further, I don’t think.” And the other replies: “Quite fair. I guess it’s really the end of the film.”
A spokesperson for the NCSC said The register“To raise public awareness of the crucial advantages of allowing a two -step verification on their most important accounts, we have associated with popular influencers on social networks to amplify this vital message and encourage a wider audience to adopt secure online habits.”
Authentication with two factors and multi-factory authentication are means to make accounts more secure. It operates by sending a code to a separate device during the connection which must have entered before access to access. Biometrics, such as fingerprint recognition or face recognition analyzes is also used, as well as dedicated authenticator applications.




