How does 2-factor authentication work?
Dec24

How does 2-factor authentication work?

Any more or less experienced Internet user came across 2FA at least once. But not everyone understands how it works. To use this powerful data protection tool more effectively let’s learn more about it. The first factor of 2-factor authentication – what we know Two-factor authentication starts with the usual standard password used for signing in on any website. Usually, the users themselves choose the password to create an...

Read More
How to Choose and Use Strong Passwords
Dec21

How to Choose and Use Strong Passwords

In 2007, the most popular password among the Internet users was the word ‘password’. Later, people have realized that strong passwords should include not only letters but also numbers. And in 2008 “password1” became the users’ favorite password. Despite all efforts of cyber security experts, who tried to explain to the average users, that predictable and frequently used passwords cannot be trustworthy,...

Read More
Hardware or Software Token – Which One to Choose?
Dec11

Hardware or Software Token – Which One to Choose?

Striving for maximum versatility and convenience is the main trend of our time. It triggers a general affection (which often borders on addiction) for smartphones. For a modern person, these small devices embody the principle “All that is mine, I carry with me”. A regular phone has now become a mini laptop computer, which also enables you to make calls (but it is no longer its leading feature). Since any computer should...

Read More
Why Everyone Should Care About Data Protection
Dec10

Why Everyone Should Care About Data Protection

There is an opinion that an average Internet user can not be a subject of interest for hackers and other thieves of confidential data. The head of the CIA or celebrity is a completely different story. But what can hacker expect from an ordinary person? No intriguing secrets, no big money. It seems like there is no need in data protection for common people. But everyone thinking this way is seriously mistaken. There are a lot of...

Read More
Identification, authentication, and authorization – what’s the difference
Nov26

Identification, authentication, and authorization – what’s the difference

Identification, authentication, and authorization. We all face these three concepts every day, but not everyone knows the difference. Since these terms are essential in data protection, they deserve to be explained better. To begin, let’s take an example from everyday life. It will help you to understand the difference between authentication and identification in general. A new employee comes to work for the first time. At the...

Read More