: This is the strongest defense. Even if a hacker has your password, they won't be able to log in without the second code.
: Often created through "credential stuffing" attacks, where hackers use passwords leaked from one site to try and break into accounts on another.
: Enter your email on Have I Been Pwned to see if your data has been part of a known breach.