Please read this article to learn how to protect your Parallels account from unauthorized access from unknown devices and locations using two-step verification.
Two-step verification adds an extra level of security to your Parallels account. After two-step verification is configured for your account, you will sign in to it in two steps:
Step 1 – sign in using either your Parallels account credentials (email and password) or external service (Apple, Google, or Facebook).
Step 2 – in the message from Parallels sent to your email, confirm that you trust the web browser or mobile device from which an attempt to sign in is being made.
To enable two-step verification:
- Use a web browser to sign in to your Parallels account at https://my.parallels.com
- Open the Security Settings page (https://my.parallels.com/profile/personal/security)
- Switch the Two-Step Verification option to Enabled
- Select the Preferred Method of two-step verification:
- Email, unconditional
- Email, conditional (least recommended)
Each time you sign in to your Parallels account from an unknown browser or mobile device, you will receive a message from Parallels where you need to confirm that you trust this browser or device.
IMPORTANT! - before you confirm, please carefully check the origin of the request – name/type of the browser, IP address/location, and time of login attempt.
Confirmation for each browser or mobile device is required only once. If you confirm you trust it, you will not be asked to confirm the next time you sign in to your Parallels account from the same browser/device.
This method is similar to the one described above. The only difference is that you will be asked to confirm an unknown browser or mobile device only if your Parallels account has critical resources, such as remote computers registered in Parallels Access or you are a member of a business account with registered corporate resources (e.g., Mac computers with Parallels Desktop, Parallels Remote Application Server farms or Parallels Device Management servers).
This is the least recommended method, however, it’s still better than having two-step verification disabled.