Your password; and
A one-time password (OTP), which is generated by Google Authenticator (mobile app) installed on your mobile device.
Risk awareness hero

Protecting yourself if you choose not to use 2FA when trading with OANDA

You should observe the following practices to help secure the confidentiality and integrity of your password and OTPs, personal details, and other confidential data. These will help mitigate the risk of unauthorised transactions and fraudulent use of your accounts, and reduce the chance of unlawful parties observing or stealing your access credentials or other security information to get unauthorised access to your online accounts:

(a) Take the following precautions with your password. Passwords should:

Be at least 8 characters of alphanumeric mix;
Not be based on guessable information such as your username, telephone number, birthday, or other personal information;
Be kept confidential and not be divulged to anyone;
Be changed regularly or when there is any suspicion that your online identity has been compromised or impaired; and
Not be the same for different websites, applications, or services, particularly when they are related to different entities.

(b) Do not select the browser option for storing or retaining username and password;

(c) Check the authenticity of our website by comparing the URL and our name in its digital certificate or by observing the indicators provided by an extended validation certificate;

(d) Check that the website address changes from ‘http://’ to ‘https://’ and a security icon that looks like a lock or key appears when authentication and encryption is expected;

(e) Check your account information, balance and transactions frequently and report any discrepancy;

(f) Install anti-virus, anti-spyware and firewall software in your personal computers and mobile devices;

(g) Update any operation system, virus and firewall products with security patches or newer versions on a regular basis;

(h) Remove file and printer sharing on computers, especially when they are connected to the Internet;

(i) Regularly back up critical data;

(j) Consider the use of encryption technology to protect highly sensitive or confidential information;

(k) Log off each and every online session;

(l) Clear browser cache after each and every online session;

(m) Do not install software or run programmes of unknown origin;

(n) Delete junk or chain emails;

(o) Do not open email attachments from strangers;

(p) Do not disclose personal, financial or credit card information to little-known or suspect websites;

(q) Do not use a computer or device that cannot be trusted; and

(r) Do not use public or internet cafe computers to access online services or perform financial transactions.