...
NOTE: It is strongly recommended that all mobile devices used as a second factor be encrypted and have a screen lock enabled. We also recommend that you register a second device as an alternative method of authenticating.
See Related Issues articles below for specific device instructions.
...