How to Backup Google Authenticator or Transfer It to a New Phone
Jun30

How to Backup Google Authenticator or Transfer It to a New Phone

Our regular readers know that we strongly recommend applying two-step verification wherever it’s possible. In the contemporary world, where database leaks are a standing affair, two-step authentication is not an option, it is, in fact, a must. If you use two-factor verification, an intruder would need to get both the unique password you came up with, and the gadget, which produces the verification codes, to break into your account....

Read More
Remote Work: Dream or a Threat?
Feb04

Remote Work: Dream or a Threat?

Remote work is a blessing for some people and a real curse for others. In this article, we have collected all the tips to help you organize remote work in your company. We are talking about task trackers, modern communication tools, and the organization of remote access to corporate servers at the same time. We used all our experience to make this difficult task easier for you. What’s important, when organizing a home office for...

Read More
OATH Initiative – the Main Goals, Tasks, Ins & Outs
Jul01

OATH Initiative – the Main Goals, Tasks, Ins & Outs

Providing our services, we often highlight that Protectimus is a coordinate partner of the OATH Initiative and that all our tokens and two-factor authentication software are OATH-certified. Not everybody is aware, however, of what the Initiative for Open Authentication (OATH) is and what its major goals are. That’s why we decided to clarify all the details concerning the OATH definition – its tasks, algorithms, and overall...

Read More
Best Protectimus MFA Features for Financial Services Cybersecurity
Jan20

Best Protectimus MFA Features for Financial Services Cybersecurity

The financial services industry is inherently more at risk of cyberattacks than any other industry. Financial sector includes everything from investment consultants and stocks to insurance and banking; naturally, the money that floats within the financial industry is very tempting to hackers. In fact, according to Verizon’s 2019 Data Breach Investigations Report — 71% of recent cyber attacks were motivated by money itself, nothing...

Read More
How to Protect Yourself From Email Hacking
Aug30

How to Protect Yourself From Email Hacking

We have almost stopped writing paper letters, those on crispy brand-new sheets. The lion’s share of the correspondence is now sent via emails. And often it is not even personal correspondence. For personal purposes, we have different messengers and can have an interactive dialogue. Usually, emails are used for sending business letters, which contain sensitive information. Thus, the email data protection is extremely important...

Read More