Home >  Blog >  Securely transferring 2FA Apps

Securely transferring 2FA Apps

Posted by Michael Goodwin on 15 August 2024
Securely transferring 2FA Apps

Safeguarding Your Business: The Security of Transferring 2FA Apps to a New Phone


Security of information is a constant concern, especially when it comes to protecting sensitive information. Security is a concern for our private information and is legislated requirement for information businesses hold in regard to their clients.

There is information we are allowed to store, and some that privacy laws forbid us from storing.

What it all points to is the need for secure storage and for systems that demonstrate good governance.

This has led to 2 factor and multi-factor authentication being the norm for accessing cloud based storage. This includes for accessing what might be considered our simple apps, such as email.

2FA adds that extra layer of security, but what happens when you get a new phone?

Transferring data and apps from one phone to another is a pretty simple process with modern systems and phones.

Typically, as you start the new phone it will take you through a procedure that leads to using your new phone to simply scan a fuzzy image on the old phone, and the system takes over.

However, the process of transferring these 2FA apps and their associated codes from one phone to another is not quite as straightforward. This blog explores the security implications of moving your 2FA setup from an old device to a new one, focusing on the differences between Google Authenticator and Microsoft Authenticator, and what that means to your business in terms of systems and being seen to protect data as best you can.

(Please contact us and discuss having us assist you in this process to make sure that security protocols are followed, and to make it easier for you to do.)

Google Authenticator

Google Authenticator is popular due to its simplicity and wide adoption. It provides a relatively straightforward process for transferring your accounts from one device to another.

When you switch to a new phone, Google Authenticator allows you to move your accounts by scanning a QR code generated by the old device. This process is user-friendly, but the automatic nature of the transfer process does not provide the highest level security.

Because the transfer is largely automated, there’s a reliance on the assumption that the old device is secure at all times. If someone gains access to your old phone, they could potentially initiate a transfer without further verification, placing your accounts at risk.

Moreover, Google Authenticator doesn’t require additional identity verification steps beyond scanning the QR code. This means that if someone else were to access your QR code, even briefly, they could duplicate your 2FA codes onto their device without your knowledge. This lack of additional security checks might be fine for personal use, but for a business handling confidential data, this could present significant risks.

Microsoft Authenticator: A More Secure Alternative?

Microsoft Authenticator, is designed with a protocol that is considered more secure. While it may be slightly less convenient than its Google counterpart, it compensates by providing, what might be considered, more robust protection during the transfer process.

One of the key advantages of Microsoft Authenticator is its requirement for a cloud backup, which is encrypted and tied to your Microsoft account. When you set up a new device, you don’t just automatically transfer your 2FA codes. Instead, Microsoft Authenticator requires you to sign in and verify your identity—typically through a password or biometric authentication—before any transfer can be completed. This additional layer of security ensures that only you can restore your 2FA codes on the new device.

The manual nature of this process, while adding a few extra steps, significantly reduces the risk of unauthorised access. If your old phone is compromised, the intruder would still need to pass through these identity checks to access your 2FA codes on a new device. This feature is particularly valuable for businesses that must protect sensitive client information or proprietary data.

Furthermore, the cloud backup feature in Microsoft Authenticator means that even if you lose your phone, your 2FA codes are not lost. They remain securely stored and can be restored once your identity is verified. This contrasts with Google Authenticator, where losing your phone without having backed up your 2FA accounts has a higher chance of causing disruption.

What Best for Your Business?

As a business owner, ensuring the security of your two-factor authentication setup is crucial. While the process of transferring your 2FA apps might seem like a minor task, the potential risks involved in choosing convenience over security could have serious consequences.

We always advise, from a technical perspective, to opt for the more secure alternative, while realising that every person and business needs apps and processes that best suit them.

Please contact us to discuss the best authenticator, and steps for protection, for the data you keep and your business.

Where to find more information

Loyal I.T. Solutions provides advice and implementation of the right hardware and software for your business. We are here to help. Please contact Loyal I.T. Solutions at 02 4337 0700 or reception@loyalit.com.au.

Michael GoodwinAuthor:Michael Goodwin
About: Michael Goodwin began his career in Information Technology in 1992 and he brings a wealth of experience to his is current venture - Loyal I.T. Solutions. Based on the NSW Central Coast, Loyal IT Solutions services businesses large and small from Sydney to Newcastle.
Connect via:LinkedIn
Tags:WindowsServicesSecurityITIT ConsultingNetworking SecurityCommunity2FA

Log a Job
Or an Enquiry

help@loyalit.com.au

Loyal IT
Latest news

1 October 2024
Unlocking Advanced Business Potential with Microsoft Copilot   In our previous blog, we explored the basic functiona...
Read All Latest News

Our Clients
say

Brendon rang me, and he fixed the problems for me. A very nice fella, very polite and clever. Loyal IT have an awesome staff. No computer glitch is a worry for them, they just go straight in and fix it, big or small! So glad that Loyal IT has our back! Thanks so much....

Doreen Smith
Read All Testimonials

Resources Helpful
fact sheets

Download Our Fact Sheets

Sign Up for Newsletter