Apple has finally listened to their users and added two-step verification for login security within iMssage and FaceTime. Previously, this two-step verification process existed to protect Apple accounts, when users opted-in, and was later applied to iCloud after the security breach that happened late in 2014 – which revealed a number of celebrities personal photos. Now though, the feature will be available for anyone who wants to utilize it – which will give an added layer of security to iMessage and FaceTime – which already include mild encryption – at least to the point of protecting user’s messages from outside intrusion.

Apple Two Step Verification

The new two-step process really is not that difficult and will focus on preventing people who are not authorized to access an Apple account – from doing so, in an effort to collect text messages, or FaceTime information. The move was announced on Thursday by Apple, and was received in a very positive light. While Apple hasn’t had any major security breaches since the iCloud photo scandal – it remained hot on user’s minds as they become more entrenched with the digital landscape, and more aware of ill-minded users trying to hack their personal accounts.

Services like Facebook, Twitter, and even Google have added two-step verification processes to ensure that user’s information is safe – which makes Apple last to arrive at two-step verification for this particular service. However, two-step verification is not necessarily bulletproof as it has many of its own shortcomings. The process though is significantly less risky than other methods of keeping login credentials safe.

For those who are looking to take advantage – the process is relatively simple. The simplest method to completing and setting up your two-step verification is by going to and following the on-screen instructions – which really just include entering your information, and obtaining a recovery key. At the end of the process the user will have a 4-digit key, in addition to a traditional password – which will add the second layer of protection. While the process may sound relatively simple, the added security it brings to the table is really important. It’s worth noting that Apple rolled this type of security out for iCloud shortly after the original breach occurred, which cost many individuals their personal information and photos. This only allows users to remain in control of their devices, and prevent other devices – which are not trusted – from gaining access to their accounts without proper authority and information.