TOTP Tokens Protectimus Slim NFC: FAQ
Feb10

TOTP Tokens Protectimus Slim NFC: FAQ

The first programmable TOTP tokens Protectimus Slim NFC were released just a couple years ago. Since then, we’ve received hundreds of orders, as well as hundreds of questions about how it works, how programmable security key differs from the classic one, how to program tokens, and whether or not using this kind of OTP token is secure. In this article, I’ll explain how classic TOTP hardware token and programmable TOTP token...

Read More
Best Protectimus MFA Features for Financial Services Cybersecurity
Jan20

Best Protectimus MFA Features for Financial Services Cybersecurity

The financial services industry is inherently more at risk of cyberattacks than any other industry. Financial sector includes everything from investment consultants and stocks to insurance and banking; naturally, the money that floats within the financial industry is very tempting to hackers. In fact, according to Verizon’s 2019 Data Breach Investigations Report — 71% of recent cyber attacks were motivated by money itself, nothing...

Read More
Sophos 2FA with Hardware OTP Tokens
Dec02

Sophos 2FA with Hardware OTP Tokens

Sophos solutions allow for reinforcing Sophos 2FA (two-factor authentication) with Protectimus OTP hardware tokens with one of these two methods: Enabling ‘Auto-create OTP tokens for users’ feature. This automatic method allows for using our programmable Slim NFC token instead of the standard application for multi-factor authentication.Disabling ‘Auto-create OTP tokens for users’ feature. This manual method allows for...

Read More
2FA Chatbots vs. SMS Authentication
Oct22

2FA Chatbots vs. SMS Authentication

In this article, we’ll explain what is a bot for two-factor authentication and how 2FA chatbots (two-factor authentication with messaging service chatbots) work. We’ll look at the pros and cons of this one-time password delivery method and figure out which is best: 2FA bots or SMS authentication. Table of contents: How did the Protectimus Bot token come to be? How does two-factor authentication with chatbots work? 2FA...

Read More
2FA Security Flaws You Should Know About
Sep16

2FA Security Flaws You Should Know About

Hackers are not lazy, they evolve fast, so relying on old security measures is a terrible idea. Today we will look into how secure two-factor authentication is in general, what methods are used to hack 2FA and up-to-date ways to protect yourself against those account hacks. Finally, you will get answers to the most recurrent questions on 2FA security. How secure is two-factor authentication? Is two-factor authentication safe? All...

Read More