Blog Feed
How to Set Up 2-Factor Authentication on ICE3X
This guide has a purpose to explain three things: How to enable 2-factor authentication on ICE3X.How to disable two-factor authentication on ICE3X.How to use a programmable hardware token Protectimus Slim NFC for 2-factor authentication on ICE3X. Learn more about Protectimus Slim NFC token or order one here: Protectimus Slim NFC The best 2FA token to protect your ICE3X account! How to turn on 2-factor authentication on ICE3X 1. Login to your ICE3X account. To avoid phishing make sure you use the right URL: https://ice3x.com/ 2. Chose Account section at the main page. Just click the necessary icon in the right upper corner. 3. Go to SETTINGS section. Note: If you haven’t enabled 2-factor authentication on ICE3X yet, you’ll see a notification with the fast link to the settings section. You can use it instead. 4. Go to “SECURITY” settings. 5. Enable 2-factor authentication. 6. You will see the QR code with the secret key (seed). Use it to enroll the token in your authentication app or program Protectimus Slim NFC token. 7. Enter the one-time password from your 2-factor authentication app or Protectimus Slim NFC token in the field “2FA code”. Congratulations, your ICE3X account is under protection now! How to disable two-factor authentication on ICE3X To disable 2-factor authentication go to security settings and click “Disable”. Enter the 2FA code from your current token. How to add Protectimus Slim NFC to ICE3X To enable 2-factor authentication with Protectimus Slim NFC token: Make sure that your Android smartphone supports NFC technology and download Protectimus TOTP Burner application.Go to ICE3X security settings.Click the “Enable” button to set up two-factor authentication.Use the QR code with the secret key to program Protectimus Slim NFC. You’ll need to scan the QR code with Protectimus TOTP Burner app and add it to the hardware token via NFC. You’ll find more detailed instruction on programming Protectimus Slim NFC here.Submit the 2FA code from your hardware token in the corresponding field. Note: If you want to add Protectimus SLim NFC for 2-factor authentication on ICE3X and you already have 2FA enabled, at first disable 2-factor authentication. That’s it. Please, let us know if you have any questions in comments or via email...
read moreKeycloak Multi-Factor Authentication With Hardware Tokens
Nowadays, when hackers constantly look for vulnerabilities, while more and more aspects of life are being digitized, cyber security is of utmost importance and every app developer has to pay special attention to access management. Keycloak is one of the most ingenious solutions created with app developers in mind. It provides an elegant and easy way for securing modern applications and services. With Keycloak comes an easy to roll out Multi-Factor Authentication (MFA) with one-time passwords (OTP). By default, Keycloak multi-factor authentication supports time-based OTP (TOTP) delivered via an authenticator app only. But for those who want to add an extra layer of security for their users, there is a perfect solution — reprogrammable token Protectimus Slim NFC. This token is, basically, programmed to be utilized as a replacement for the mobile authentication app. Buy hardware token for Keycloak MFA Below we provide detailed instructions on: how to configure Keycloak MFA how your users will set up their hardware Keycloak token Protectimus Slim NFC how to run Keycloak 2FA with other ways of authentication (SMS, email, hardware tokens, chatbots) Keycloak multi-factor authentication configuration Configuring Keycloak multi-factor authentication is very easy and won’t take a lot of your time. Basically, all you need to do is enforce both your existing users and your new users to use one time passwords. Enforcing existing user: Go to your Keycloak admin area, find “Users” in the sidebar menu and select a user from your list. Then navigate to the “Details” tab and select “Configure OTP” in the “Required User Actions” section: Enforcing new users: Select “Authentication” in the sidebar menu in the Keycloak admin area, then find the “Required action” tab, in the top row (“Configure OTP”) check “Default action”. Keycloak two-factor authentication with hardware tokens To hook up Protectimus Slim NFC to Keycloak the following OTP Policies have to be applied: SHA1, TOTP, 30 or 60 seconds period. Find the “OTP Policy” tab in your “Authentication” section in the Keycloak admin area and adjust the required parameters as follows, don’t forget to click the “Save” button: Now your users will be able to follow these simple steps to add Protectimus Slim as the second factor when logging into your apps or services: 1. Download Protectimus TOTP Burner application. 2. Launch our application, click “Burn the seed”, then select the “Scan the QR code” option: 3. After completing the usual login process with username and password the user will have to set up the Mobile Authenticator. This is where they will get the QR code: 4. After the code scanning is done the user needs to turn the token on, place it within the mobile’s NFC antenna range and click “Continue”: 5. After the application provides the confirmation message, Protectimus Slim NFC can be used with your Keycloak protected application or service using Keycloak multi-factor authentication: Keycloak OTP via SMS, email, hard tokens, chatbots Out of the box, Keycloak is an awesome solution for managing security and access. But integrating it with Protectimus multifactor authentication service will expand your protection options, provide more features and make your apps and services truly bulletproof. With Protectimus you will be able to add any MFA method you wish: Keycloak two-factor authentication via email, hardware tokens with hardcoded keys (these are cheaper than the reprogrammable ones), Keycloak...
read more9 Must Follow Gmail Security Rules
Gmail is perhaps the most used email service, with which people exchange terabytes of information daily. A typical account contains lots of personal details such as banking data, digital identities, passwords, trade agreements, etc. Unfortunately, despite the service’s popularity, positive reputation and constant effort of its creators, personal data is not protected enough. Besides hidden security mechanisms that work automatically, there is an array of optional measures that must be activated manually. Nevertheless, most of the latter are unknown to or ignored by the majority of users. Often it does not even take a professional hacker to exploit Google Gmail security vulnerabilities using the basic skills in social engineering. In this article, we will talk about how to secure Gmail account by following the 9 simple rules. 1. Set a Strong Password for Your Gmail Account and Change It Regularly The first thing you need to keep in mind when coming up with a password for your Gmail account is to never use anything personal, such as dates of birth (or any other memorable dates), nicknames, names of animals, etc. In general, everything that a person from your environment may know about you. It is better if it is a random set of letters (in varying case), numbers and special characters. | Read also: How to Choose and Use Strong Passwords If you don’t want to bother inventing such a strong password, just use one of many online generators. And the newly created passwords can be stored in a special password manager (for example, such as this). If you want to change your account password right now, follow these steps: Sign into your Google account and open the homepage; Go to “Security” page and click “Password” in a Signing in to Google” block; Set a new password (you will need to enter the current password to confirm your identity first). 2. Turn the Two Factor Authentication On Gmail two factor authentication is the method, which requires the user not only to carry out the standard authentication procedure (with credentials) but also confirm their identity by entering the one-time code that is generated at their mobile phone by a special app – Google Authenticator or Protectimus Smart OTP. To enable the Gmail 2 factor authentication (2FA), follow these steps: Sign into your Google account and open the homepage; Go to “Security” page and click “2-Step Verification” in a Signing in to Google” block; Click the “GET STARTED” button at the bottom of the page and enter the current password to confirm your identity; Choose the desired 2-step verification option: SMS or phone call authentication. You can link your phone number to the Google account and use SMS or phone call authentication. Google Prompt. With Google Prompt you’ll need only to tap one button on your smartphone to sign in. Keep in mind that only those smartphones that are already connected to the same account can be chosen to receive Google Prompt messages. Security key. Security keys are hardware 2-step verification devices that support FIDO standards. Google offers 2 types of security keys – USB Security Key and Bluetooth Security Key. Google sells both devices in one bundle. You’ll need to buy the security key bundle for $50 first. Google Authenticator or another 2FA app. Google Authenticator is...
read more4 Reasons Two-Factor Authentication Isn’t a Panacea
Two-factor authentication (2FA) is an indispensable cybersecurity measure used to protect data. Most of the modern information security standards despite the area of application such as PCI DSS, PSD2, HIPAA, etc., demand the multifactor authentication (MFA) among other data protection methods. This approach allows mitigating the danger coming from such attack vectors as brute force password cracking, keylogging, social engineering, phishing, and some kinds of man-in-the-middle attacks. Nevertheless, two-factor-authentication is not a cure-all solution by itself. This is just a single component in a major set of requirements for high-quality data protection. Taking care of data security means implementing a complex plan of actions. For example, this is clearly seen in the in the article 10 Steps to Eliminate Digital Security Risks in Fintech Project where we analyzed the components needed to protect payment gateways from cyber threats. In the current article, we’ll unveil all the weaknesses of two-factor authentication you have to keep in mind when strengthening your security infrastructure with MFA. And, of course, we’ll discuss all possible solutions to these weaknesses. 1. SMS authentication is not secure The US National Institute of Standards and Technology (NIST) recommended every company to abandon SMS authentication as insecure and no longer suitable strong authentication mechanism long ago. But many companies worldwide still opt for SMS to deliver the one-time passwords in their 2FA infrastructures. And it was only three months ago that Reddit has admitted this method to be not as effective and secure as the company was hoping. No doubt, SMS authentication is convenient for companies and users alike. But is this a reliable option? Unfortunately, no. Let us review the SMS authentication vulnerabilities. SIM-card Replacement In most cases, it wouldn’t be a hard task for a dedicated culprit to use a mobile operator’s SIM-card replacement service and intercept a victim’s number. The information needed for this fraud can be found in public sources or bought on the dark web. Network Protocol Vulnerabilities The next potential risk hides in the cellular protocols. And the fact that SMS exchange is not encrypted in any way. The security of SMS transport depends on the cellular network security. There is a number of vulnerabilities in consumer cellular networks as well as methods of exploiting them. Some of the most advanced ones do not even require costly hardware or specific skills. From this point of view, using SMS for security is rather dangerous. Moreover, if to take into account the fact that a usual SMS exchange is not encrypted in any way, an employee of a network center with a proper access can freely read all the messages. Not to mention all the possible ways to intercept the radio transmissions. Malware There are tons of fraudulent software aimed to steal the sensitive data. And mobile device trojans intercepting SMS messages are nothing new. Infection is immediate; the consequences are dire. Malware that ingrained itself into the gadget can play a variety of roles: Intercept the entered login credentials and one-time passwords as well; Track all the sent and received messages; Record the voice calls; Copy the SIM card parameters and contact information; Provide capabilities for remote control; Turn a device into a member of botnet or crypto-currency mining agent, etc. The tech-savvy attacker has nearly unlimited opportunities especially it concerns making use...
read moreDuo Security vs Protectimus
Recently, Cisco declared its intention to purchase Duo Security for US$2.35 billion. Naturally, this is an important event not only for Duo Security, but for the entire multi-factor authentication industry. A sale of this magnitude confirms that the demand for two-factor authentication is higher than ever before. This also shows that there is a demand for simpler, less expensive means of delivering one-time passwords, since Duo prominently advertises its rejection of hardware tokens in favor of 2FA apps, push notifications, and SMS messages (which are expensive and not secure). Protectimus fully supports Duo Security’s efforts to simplify and reduce the cost of OTP delivery, but we remain convinced that security must not be sacrificed in the process. For example, in order to hasten the move away from SMS authentication to more modern, reliable MFA technologies, we’ve figured out how to deliver one-time passwords using chatbots on messaging services. This is much more efficient, secure, and convenient than SMS. Hardware tokens are also among the products we offer, and they can be connected to practically any site: from Google, Facebook, Dropbox, and Slack to cryptocurrency exchanges like Bitfinex, Coinbase, Poloniex, and so on. In light of that, has Cisco made the right decision? Should they maybe have spent $2.35 billion on acquiring Protectimus instead? We’ve decided to compare the solutions from Duo and Protectimus to settle the matter objectively. DON’T LIKE LONG READS? FIND OUR CONCLUSIONS IN A COMPARISON TABLE AT THE END OF THE ARTICLE. 1. Server-side component Duo Security Duo is a cloud-based 2FA solution. The choice of the SaaS model is completely logical. It makes integration fast and reduces the cost of deploying, protecting, and maintaining an authentication server. This style of interaction is convenient and easy for the client and company alike. In addition, it’s a rather modern approach to strong authentication, so it fits well with Duo Security’s concept as a modern, innovative provider of revolutionary MFA solutions. Protectimus Protectimus two-factor authentication solution is available not only in cloud-based form but also as an on-premise platform. Often, we advise customers to choose the cloud-based service, since it’s convenient, fast, and modern. Clients connected to the Protectimus SaaS service don’t need to waste time and money on extra equipment, security measures, and sysadmin salaries — there’s no load balancing or other infrastructure issues to worry about. The result is rapid integration with minimal costs. However, some companies can’t make use of cloud-based services because of strict information security rules, either from within the company or imposed by the government. For these cases, we made it possible to purchase an on-premise platform that clients can install in their own environments, allowing them to retain full control of the authentication server. Both the on-premise platform and cloud-based service are available with a subscription. Lifetime licenses for the platform can also be purchased. You can find out more about the differences between the cloud-based service and the platform here. 2. Features Duo Security Note: Nearly all features examined in this section can be activated only with Duo’s most expensive payment plans, Access and Beyond. Self-service is also available in the Duo MFA basic plan. Duo offers a range of additional features to make administration easy and increase the level of resource access protection: User self-service. Geographic filters. Prohibiting access from...
read moreDuo Security vs Protectimus: Features
In Duo Security vs Protectimus, we touched on all the aspects of Duo and Protectimus two-factor authentication solutions. We examined the technologies these companies use, their methods of delivering one-time passwords, the availability of an API and pre-made plugins for integration, pricing, availability in cloud-based and on-premise forms, and — briefly — the features of each solution. In this article, we describe in greater detail the features available to administrators and users of the Duo and Protectimus multifactor authentication services. You can use this table to navigate the article more easily. User self-service User self-service Geographic filters Geographic filters Network- or IP-based access control Adaptive authentication Role-based access policies Differentiation and delegation of authority within the system Monitoring and identification of vulnerable devices Ability to assign different types of tokens to different users Time-based filters CWYS (Confirm What You See) data signing functionality Duo Security Note: Nearly all features examined in this section can be activated only with Duo’s most expensive payment plans, Access and Beyond. Self-service is also available in the Duo MFA basic plan. User self-service Users can issue and manage tokens themselves. This saves administrators time. Saving administrators time means saving the company money, which is always good. Geographic filters These allow administrators to grant access to a resource only from a specified geographic location. Or, they can deny access from certain countries (for example, North Korea or Russia). Network- or IP-based access control This feature is also referred to as adaptive authentication by Duo. It gives administrators the ability to block access to a resource from anonymous networks (such as Tor). Access can also be allowed or denied from a specific range of IP addresses. Role-based access policies This makes it possible to impose stricter authentication rules for specific users or groups of users, depending on their roles and their levels of access to data. For example, an accountant might be able to choose any authentication method — SMS, push notifications, or a one-time password from an app — while a network administrator might be required to use a hardware token exclusively. Monitoring and identification of vulnerable devices This unique technology allows you to keep tabs on users’ “device hygiene” if they have the Duo Mobile app installed. Using this system, you can see how well-protected each device is: find out if biometric authentication and screen lock settings are configured; find out if antivirus is installed; find out what operating system, browsers, and plugins are installed, and whether they’re up to date; see if the device is personal or company-owned; see if the device has been rooted, etc. An administrator can block access to the system from devices that don’t meet preset requirements (for example, if no antivirus is installed). Protectimus Note: All features examined in this section are available with all payment plans, including the no-cost Protectimus Free plan. User self-service This feature takes a burden off of the system administrator’s shoulders, saving the administrator time and the company money. Users can issue and manage their own tokens. Geographic filters These allow restricting access to specific countries only. Access from specific countries (Russia, North Korea, etc.) can also be blocked. Time-based filters This feature allows granting access to a resource only at certain times; for example, only during business hours. This approach significantly increases...
read moreDuo Security vs Protectimus: Authentication Methods
You can find a general comparison of the Duo Security and Protectimus two-factor authentication solutions in the article “Duo Security vs Protectimus“. In it, we explore the features and technologies used by Duo and Protectimus, the availability of these solutions in cloud-based and on-premise forms, integration options and prices, and the authentication methods offered by each company. Here, we describe the authentication methods available to Duo and Protectimus clients in greater detail, as well as examining each option’s pros and cons. You can use this table to navigate the article more easily. 2FA app 2FA app Push notifications Push notifications HOTP tokens HOTP tokens TOTP tokens TOTP tokens U2F tokens OCRA tokens SMS authentication Reflashable TOTP tokens Voice calls SMS authentication Backup codes Email authentication Protectimus Bot Duo Security Duo Mobile 2FA app Duo Push Duo Security’s pride and joy. Push notifications were introduced to make the process of two-factor authentication as simple as possible. Instead of opening a 2FA app for one-time passwords generation, finding the code generated for the desired service, and then inputting 6 digits into a password entry window, the user needs only to unlock their smartphone and tap the “Approve” button. There’s another advantage: if a hacker attempts to gain access to the user’s account, a push notification will appear. The user can block the access attempt by tapping the “Deny” button. The Duo Mobile app can be synchronized with smart watches, so users can receive push notifications directly on their watches. It’s quite convenient. The main drawbacks are that it’s impossible to authenticate without internet access, and users may have to use their personal phones for business purposes. HOTP and TOTP The Duo Mobile app can generate one-time passwords using only the HOTP and TOTP algorithms (note that TOTP tokens can become desynchronized from the server time; Duo Mobile lacks a synchronization feature). HOTP passwords are used to log into accounts protected by the Duo two-factor authentication service if the user cannot receive push notifications. Support for the TOTP algorithm is included in order to facilitate the use of the app for authentication with third-party services not connected to Duo Security, such as Google, Dropbox, and GitHub. Hardware tokens HOTP tokens The Duo Security two-factor authentication service supports hardware HOTP (HMAC-based One-Time Password) tokens from any vendor. It also sells its own HOTP tokens. It’s worth noting that while the HOTP algorithm does meet OATH (Initiative for Open Authentication) standards, this algorithm is outdated and cannot be considered sufficiently secure, particularly in the case of hardware tokens. The moving factor used to generate one-time passwords with the HOTP algorithm is a counter. If an attacker has the opportunity to gain control of the token for even a few minutes, the attacker can write down a few one-time password values and use them at any time. In the process, the actual user may also lose access to their account, as the token will become desynchronized from the authentication server. TOTP tokens Duo Security allows connecting third-party TOTP hardware tokens to its 2-factor authentication service but doesn’t recommend it as there is no functionality for time synchronization in its MFA system. U2F tokens The Duo Security two-factor authentication service also supports the U2F (Universal 2nd Factor) standard, developed by the FIDO (Fast IDentity Online) alliance...
read moreHow to Protect Facebook Account from Being Hacked
Why should you worry about protecting Facebook from hacking Many tend to believe that the security of their social media presence isn’t the first thing worth the effort to work on. You don’t often see a question like ‘How Can I Protect Facebook Account From Being Hacked?’ unless the person making such a request got hacked recently and now seeks the protection based on the bitter experience. What does a hacker get when they hack FB account of yours? Obviously, criminals get access to all your photos and messaging history, which opens ‘great’ social engineering opportunities. You might have heard stories where close friends ask to borrow some money in a message and, well, many people say ‘Sure, here you go!’ and get scammed. Criminals may also extract much more of other information from your private messages. Who would like their messages to be read by a stranger at all? There may be some confidential info there. Secrets. Passwords. Nudes? What if all this becomes public? You can ask Jennifer Lawrence about what might happen. Hackers can ultimately undermine your reputation and make your friends’ private information also vulnerable to publicizing and other manipulations. But the main thing is that GDPR (General Data Protection Regulation) has now come into force and Facebook allows users to download all private data related to their personal accounts in one click. That means a hacker interloping your profile will be able to do the same. Protect your Facebook account with a hardware 2FA token This article will tell you how to protect Facebook account from being hacked and offer a whole list of Facebook security best practices. Let’s secure your account and keep your private info safe. Zuckerberg’s own Facebook account got hacked in breach https://t.co/Fs4DHBeSS6 pic.twitter.com/AzL9HUw5Sa — New York Post (@nypost) September 29, 2018 Useful to know: Top 10 Ways Hackers Use To Hack Facebook Accounts Now let’s get acquainted with a list of Facebook profiles hacking options and find out how to protect Facebook account from being hacked: Method Description What to do Password phishing The most popular and fruitful way to get your account data is the creation of full copies of real Facebook pages. Victims enter their emails and passwords to log into a fake page, becoming an easy prey for a scammer. Try not to work with Facebook from unknown devices; Use VPN while using public WiFi; Don’t click the links in emails from the ‘Facebook team’ claiming your account is hacked and you must enter your verification data immediately; Try to use Google Chrome for Facebook, this browser is able to recognize some phishing web pages. Authentication data saved in the browser A browser usually offers you to save login and password to automate further authorizations when you enter your Facebook page. If you accidentally launch a hacker resource and allow saving the data, your security gets ultimately undermined. Never use automatic authorization in your browser for any website including Facebook. To find out which passwords you have already saved and secure yourself from chances of being hacked enter the following in Google Chrome: chrome://settings/passwords Learn how to check saved passwords in Firefox here. Email breach Sometimes, it’s easier for scammers to break into your email than hack FB. If you don’t use a strong password to protect...
read more10 Windows Computer Safety Tips
Windows is undoubtedly the most popular family of operating systems for personal computers and laptops worldwide. It is used on home machines and corporate workstations alike, so the question of ensuring Windows user profile security is essential. This article provides some Windows computer safety tips we hope will be useful to you. In order to understand how to protect Windows and what Internet safety measures are there, we must first understand what Windows security breaches are possible and widespread. Thus said, there are 10 major Windows security issues to keep in mind: Unpatched and outdated software. Lack of antivirus for Windows 7 or later versions. Disabled Windows firewall. Absent disk encryption and backups. Lack of minimum Windows security standards. Full access permissions for everyone. Weak passwords. Insufficient Windows security policy strength. Legacy software within the corporate network. Mobile access exploits. Even this short breakdown of the main issues of Windows computer protection allows highlighting the massive problems any business can face if they prefer to leave the matter unattended. Luckily enough, there are multiple solutions for each of the aforementioned issues, and we will list them too. 1. Update Windows and Software Regularly Disabling the automatic Microsoft Windows update is the easiest way to ensure the system won’t begin to upgrade while you are playing your favorite online game, yes. However, this is the shortest route for the hackers to get access to your system once they are inside the network. Still thinking that providing that full access to anyone was a great idea? When you use only licensed and fully updated software, the risk of catching a virus is significantly reduced. Do you recall the 2017 Petya ransomware attacks in Europe? It turned out the major part of infestation was done through a security backdoor that was fixed by a Windows update released… 6 months prior to the attacks! If only the users had 10 minutes to download an install it…Instead, they either paid ransom or lost their sensitive data. Enable automatic Windows updates For Windows 7 update just go to your Windows control panel from the Start menu, there go to System and Security>Windows Update>Change Settings. Then choose the time when you can spare about 15-30 minutes to download the Windows upgrade files, install them and reboot the computer — and rest assured your Windows system files are up-to-date. The same goes for all the software you use, as new vulnerabilities in multiple software and hardware tools are discovered daily, like these Meltdown and Spectre processor vulnerabilities. Create a restore point One of the best ways to secure Windows computers is to create a Windows restore point. Sometimes the new drivers are incompatible with some of your hardware, or update process may go awry, etc. There is a widely-known case when Windows 7 users have to download the outdated Nvidia drivers to play Heroes of Might & Magic VI, as any new version of the video drivers results in black screen. However, the consequences might be much more serious than the inability to play one of the best turn-based games of all times. To create a system restore point on Windows 7 go to the Start menu, there to Control Panel>Systemand Security>System and go to System Protection tab. Press the Create button and choose the name for...
read moreWhy US, Canadian, and EU Universities Choose Programmable Hardware OTP Tokens
Almost all universities and colleges in the US, Canada, and EU use two-factor authentication to protect their faculty and staff accounts. Quite often they choose in-app 2-factor authentication, which means that one-time passwords are generated on the users’ smartphones. Though, in this case, they face a few issues: Not everybody agrees to use their personal smartphones for corporate needs. Some people still use old models of cell phones and can’t download a 2FA app physically. When people use their own devices there is no guarantee that these devices aren’t infected with viruses. Many universities turned to Protectimus for help describing the same situation. Among them are The George Washington University, Middle Tennessee State University, College of Central Florida, University of Guelph, Simon Fraser University, Old Dominion University, The University of Groningen, Trent University, etc. And actually, there is a simple solution (not to consider buying corporate smartphones for all the staff) – programmable hardware tokens Protectimus Slim NFC. These OTP tokens are programmed as if it was a 2FA app. Everything you need is one NFC enabled Android smartphone for the administrator. The admin scans the QR code with the secret key using TOTP Burner application and then flashes this secret key to the token via NFC. TOTP Burner app is available on Google Play for free. The administrator can program an unlimited number of tokens with one smartphone. So, with programmable hardware tokens: You don’t have any troubles with people who don’t have a smartphone or don’t want to use their own device at work. You don’t worry about any malware. The hardware OTP token is a standalone device which works without Internet or GSM connection. So the user can’t infect this device even if they want to. The administrator is the only person who knows and stores the secret keys. It’s not possible to pull the secret key out of the token. Besides, we offer custom branding for any number of Protectimus Slim NFC tokens starting from a single piece. Check the custom branded tokens our customers already use. Read also: Read more about Protectimus Slim NFC tokens or order few pieces to test How to Program Protectimus Slim NFC Token How to Backup Google Authenticator or Transfer It to a New Phone The Pros and Cons of Different Two-Factor Authentication Types and Methods 10 Basic BYOD Security Rules Top 7 Tips How to Protect Yourself from Phishing Scams Social Engineering: What It Is and Why It...
read more