With cybercrime rising, there’s an uncomfortable truth we all need to acknowledge: passwords alone aren’t enough to keep our accounts safe. That’s why we’re adding another layer of protection with Trusted Device Authorization in Mews Operations.
It lets you control which devices can access your account, keeping unauthorized users out – even if they manage to get your password. Ready to add some serious muscle to your system security? Here’s what you need to know.
What is Trusted Device Authorization Management?
Trusted Device Authorization ensures that only approved devices can access your system. It offers an extra layer of security that prevents unauthorized users logging in, even if they somehow acquire valid login details (through phishing, for example).
The latest enhancement enables property admins and users to view and manage a list of approved devices in one place. Whether you need to remove an old device or review active logins, you have complete visibility and control.
What are the benefits?
1. Stronger security
Device authorization management adds extra security by allowing only trusted devices to access your system.
2. Log out from anywhere
Most of us have left ourselves logged in on a device that might be unsafe: a shared computer or maybe an old phone. Trusted Device Authorization lets you log these devices out remotely to minimize risk.
3. Admin control, simplified
It’s all in one place – property admins can see all approved devices, remove any that shouldn’t have access, and ensure only trusted devices remain connected.
4. Reverification on removal
If you remove a device, it won’t be able to log in without going through the verification process again. This helps make sure that only devices you trust can access your account.
How it works
Incorporating Trusted Device Authorization into your security setup is super simple.
-
For users. In Account Settings, look for the Privacy and Security tab. You can easily manage your trusted devices from there.
-
For admins. The Devices and Activity tab under Users gives you a bird’s-eye view of all the devices linked to your team’s accounts. From there, you have full control – review the list of approved devices for each user, remove any unrecognized ones, and ensure secure access across your property.
-
No slip-ups. Clear confirmation prompts make adding and removing devices straightforward and avoid accidental removals.
Why it’s worth it
When it comes to system security, no one likes surprises. Trusted Device Authorization Management enhances your visibility and puts you in control. You manage who has access and how, giving you a simple yet powerful way to protect against potential threats. It’s built to scale with your business – whether that means a handful of devices or hundreds – and the user-friendly interface makes managing it all easy.
Ready to take control of your account security?
Trusted Device Authorization is live, and you can start using it today. We encourage all property admins to review and manage trusted devices. It’s a simple step that means better protection for your property (and a better night’s sleep for you).
Want to learn more? More resources are available:
Release Note: Trusted Device Authorization
How to Add a New Trusted Device
Questions about security? Leave a comment below