Want someone's feedback on your next Fusion 360 design? Then you need to be aware…
QUICK TIP: 2-Step Verification
At Autodesk, we understand that protecting your design and manufacturing data is critical to your business. Due to this (and because our success is dependent on yours!), tremendous effort goes into creating a secure environment for our cloud tools. The steps taken to provide this secure environment follow some of the most stringent in industry, and are presented in our Trust Center and in the Fusion 360 Security Whitepaper for anyone interested.
However, while data breaches at large retailers make headlines, some of the most harmful losses stem from individual lapses. Imagine the harm that can come from a device being lost or stolen, leaving your email logged on at a public place, or even something as simple as using a “weak” password. We can’t help with stolen devices and such, but one way Fusion 360 can help is by creating a more secure login. With that in mind, we rolled out 2-Step Verification.
Simply put, 2-Step Verification adds a secondary layer of protection beyond your password, and links this to a physical device. This means someone wanting to access your account would need to:
- Crack your password
- Possess your telephone without you knowing (this should go here)
- Get through your phone’s security measures (pin, fingerprints, etc.)
For more details on this measure in general, I’ll direct you to who first taught me of the importance of this: Google.
Anyway, if I was able to help convince you of the benefits of 2-Step Verification, check out this Quick Tip where I’ll show you how easy it is to set up and use this in Fusion 360:
Wishing you all a happy, healthy, and safe 2016!