What Is a VPN and Do You Actually Need One? (Plain English Guide)
By Ken Hollow, the man who had to explain encryption to someone who thinks her WiFi password is a “digital incantation” I knew it was…

By Ken Hollow, the man who spent an hour explaining to a fox spirit that a six-digit code is not “a loyalty test from the internet”
The meltdown started when Nana tried to log into her Instagram from a new phone.
“Ken. Instagram is asking me for a CODE. A secret code. I didn’t agree to any codes. This feels like a trap.”
“That’s two-factor authentication, Nana. It’s protecting your account.”
“From WHOM?”
“From anyone who isn’t you.”
She stared at the screen, entered the code, and then said — with genuine suspicion — “The internet is testing my devotion.”
Two-factor authentication (2FA) sounds technical, but it’s one of the simplest and most effective things you can do to protect your online accounts. If you’ve ever been asked to enter a code sent to your phone after typing your password, you’ve already used it. This guide explains what it actually is, why it matters, and how to turn it on for your most important accounts.
Two-factor authentication (2FA) adds a second step to logging in — after your password, you verify your identity with something else, usually a code from your phone or a fingerprint scan. Even if someone steals your password, they can’t get into your account without that second factor. According to Microsoft, 99.9% of compromised accounts didn’t have 2FA enabled. It takes about 2 minutes to set up on most accounts.
Authentication “factors” are different categories of proof that you are who you say you are. There are three types:
Something you know — a password, PIN, or security question answer.
Something you have — your phone, a security key, or an authenticator app.
Something you are — your fingerprint, face, or voice (biometrics).
Normal login uses just one factor: your password (something you know). Two-factor authentication combines two different types. Most commonly, that’s your password plus a code sent to your phone — something you know plus something you have.
The logic is simple: a hacker might steal your password. But they’re very unlikely to also have your phone in their hand at the same moment. By requiring both, 2FA makes unauthorized access dramatically harder.
“So it’s like a bouncer checking my ID AND my name on the guest list? Two checks instead of one?” — That’s actually a perfect analogy, Nana. I’m impressed.
You might be thinking: “I have a strong password. Why do I need more?” Because passwords get compromised in ways that have nothing to do with how strong they are.
Data breaches. When a company gets hacked, millions of passwords leak onto the internet. Verizon’s 2025 Data Breach Investigations Report found that stolen credentials were involved in roughly 88% of basic web application attacks. Your password might be perfect, but if the company storing it gets breached, it’s out there.
Phishing. Fake emails and websites trick people into entering their real passwords on convincing-looking login pages. Even careful people fall for sophisticated phishing attacks — they’ve gotten remarkably good.
Password reuse. If you use the same password on multiple sites (and most people do), one breach exposes all of them. Attackers automate this — they take leaked credentials and try them on hundreds of other services within minutes.
2FA protects you in all of these scenarios. Even if your password is stolen, leaked, or phished, the attacker still needs your second factor to get in. Without it, the password is useless.
Not all 2FA methods are equally secure. Here’s how they stack up:
| Method | How It Works | Security Level |
|---|---|---|
| SMS codes | A text message with a 6-digit code sent to your phone number | ⭐⭐ Basic — vulnerable to SIM-swapping attacks, but still far better than no 2FA |
| Email codes | A code sent to your email address | ⭐⭐ Basic — only as secure as your email account itself |
| Authenticator apps | An app on your phone generates a new code every 30 seconds (Google Authenticator, Authy, Microsoft Authenticator) | ⭐⭐⭐⭐ Strong — codes are generated offline, can’t be intercepted via SIM swap |
| Push notifications | A notification pops up on your phone asking you to approve or deny the login | ⭐⭐⭐ Good — convenient but can be vulnerable to “MFA fatigue” attacks (spamming approvals until you accidentally tap yes) |
| Hardware security keys | A physical USB key (like YubiKey) that you plug in or tap to verify | ⭐⭐⭐⭐⭐ Strongest — phishing-resistant, can’t be intercepted remotely |
| Passkeys | Your device uses biometrics (fingerprint/face) with cryptographic keys — no code to enter at all | ⭐⭐⭐⭐⭐ Strongest — phishing-resistant, nothing to steal or intercept |
The practical recommendation: Use an authenticator app as your default 2FA method for everything. It’s significantly more secure than SMS, free, and only marginally less convenient. SMS is fine as a fallback if an authenticator app isn’t an option — any 2FA is better than none.
Start with the accounts that matter most: email (because it’s used for password resets on everything else), banking, and social media. Here’s how to enable 2FA on the major ones:
Most banking apps now have 2FA in their security settings. The exact location varies by bank, but look under Settings → Security or Account Security. Many banks enable SMS-based 2FA by default — if yours offers an authenticator app option, switch to that for better security.
The process is nearly identical across all services: find Security Settings → enable 2FA → choose your method → verify it works. Takes about 2 minutes per account.
“I now have 2FA on Instagram, email, and my streaming accounts. My phone buzzes with codes like it’s receiving messages from the spirit realm. Ken says it’s ‘security.’ I say it’s ‘validation.'”
This is the question everyone worries about, and it’s a valid concern. If your second factor lives on your phone and you lose the phone, you could get locked out of your own accounts.
Here’s how to prevent that:
Save your backup codes. When you enable 2FA, most services give you a set of one-time backup codes. These are emergency codes you can use to log in if you don’t have access to your phone. Save them somewhere safe — printed on paper in a secure location, in a password manager, or in an encrypted note. Not on the phone itself.
Use an authenticator app that supports cloud backup. Authy and Microsoft Authenticator both support encrypted cloud backup of your 2FA codes. If you lose your phone, you can restore your codes on a new device. Google Authenticator added cloud sync as well — make sure it’s enabled in the app’s settings.
Set up a secondary device. Some authenticator apps let you install on multiple devices. Having the app on both your phone and a tablet means losing one doesn’t lock you out.
Register multiple 2FA methods. Many services let you add both an authenticator app and a phone number. If one fails, you have the other as a fallback.
Fair point. Let me counter it with some math.
The extra step takes about 5 seconds — you glance at your phone, type six digits, done. Most services remember your device for 30 days, so you only do this once a month on your regular devices.
Recovering from a hacked account takes hours to days. Changing passwords on every linked service, contacting support, verifying your identity, checking for damage — and if it’s your email that’s compromised, every account that uses it for password resets is now at risk too.
Five seconds of mild inconvenience versus potentially days of damage control. The math is clear.
And if even five seconds bothers you, passkeys eliminate the step entirely — your device handles the authentication with a fingerprint or face scan in the background. As more services adopt passkeys, the friction disappears completely.
Using SMS for everything when an authenticator app is available. SMS-based 2FA can be defeated through SIM-swapping attacks, where an attacker convinces your mobile carrier to transfer your number to their SIM card. It’s not common, but it happens — especially to people with high-value accounts. Authenticator apps aren’t vulnerable to this because they run on your device, not your phone number.
Not saving backup codes. Set it up, save the codes, then forget the codes exist until you desperately need them and can’t find them. Save them the moment they’re generated.
Approving push notifications without looking. If you get a 2FA push notification you didn’t trigger, that means someone else is trying to log into your account right now with your password. Don’t approve it. Deny it and change your password immediately.
Thinking 2FA replaces a good password. It doesn’t. 2FA is a second layer, not a replacement for the first. A strong, unique password plus 2FA is the goal. A weak password plus 2FA is still vulnerable to attacks that can bypass the second factor.
Two-factor authentication adds a second verification step — usually a code from your phone — on top of your password. Even if your password gets stolen, the attacker can’t log in without the second factor. Microsoft reports that 99.9% of compromised accounts didn’t have 2FA enabled. Use an authenticator app (Google Authenticator, Authy, or Microsoft Authenticator) over SMS when possible. Start by enabling 2FA on your email, then banking, then social media. Save your backup codes somewhere safe. The whole setup takes about 2 minutes per account, and most services only ask for the code once a month on trusted devices. It’s the single best security upgrade you can make after getting a strong password.
“I enabled 2FA on everything. Nobody is getting into my accounts without my password AND my phone AND my approval. Ken called it ‘digital fortress.’ I call it ‘what I deserve.'”
Hi. I’m Ken. I run Two Second Solutions, a one-man agency that somehow landed a fox spirit influencer as a client. I drink too much coffee, blog when I need to vent, and regularly update my résumé just in case she sets the office on fire again. I’m not crying — it’s just spell residue.
By Ken Hollow, the man who had to explain encryption to someone who thinks her WiFi password is a “digital incantation” I knew it was…
By Ken Hollow, the man who discovered his client’s password was “VelvetQueen123” and nearly had a professional breakdown I found out by accident. Nana needed…
Spoiler: Less Than Nana Thinks By Ken Hollow, reluctant IT department for a fox spirit who thinks private browsing means “the internet can’t see me”…