Two-Factor Authentication in the PCI DSS Standard
Oct12

Two-Factor Authentication in the PCI DSS Standard

The use of payment cards for the modern man has long been commonplace. But we do not always think about how extensive and complex is the work that was done by the companies which provide such services, how many diverse requirements they complied in order to give us the possibility simply to insert the card into the slot of the ATM and get our money or book the room in the internet before the vacation trip. Meanwhile, getting the right...

Read More
The Theft of The Century, or Why Do News Websites Need Two-Factor Authentication?
Sep28

The Theft of The Century, or Why Do News Websites Need Two-Factor Authentication?

Why Is Two-Factor Authentication Necessary? Increasingly more companies are using two-factor authentication in their online operations. Sometimes, it surprises or even annoys their users. They may think: why waste my precious time on entering additional characters? Isn’t a password sufficient? With the widely spread advanced computer technologies, we have possibilities that our parents could only read about in science fiction novels....

Read More
Strong Password
Sep25

Strong Password

– Sorry, your password has been used for more than 30 days, you must choose a new one! – Roses. – Excuse me, your new password is too short! – Pink roses. – Excuse me, a strong password should contain at least one number! – 1 pink rose. – Sorry, you cannot use spaces in your password! – 1pinkrose. – Sorry, you must use at least 10 different characters in a password! –...

Read More
What Hides Beneath SMS Authentication?
Jul12

What Hides Beneath SMS Authentication?

We have to pay for everything in life. Whatever you may call it — the law of conservation of energy, karma, or Divine Providence — that is how it is and how it will always be. In the 19th century, a postal courier loyal to his sovereign would risk his life delivering a letter to the addressee, which took up to a month, protecting it from any possible foes. In the 21st century, data exchange is carried out instantly, but it is a lot...

Read More
Tokens with the CWYS Function
Apr21

Tokens with the CWYS Function

To test the CWYS function and learn more about 2-factor authentication visit our demo page: Demo Protectimus offers the following OTP tokens with the CWYS (Confirm What You See) function support: Protectimus Ultra Protectimus Smart Protectimus SMS Protectimus Mail Let’s look at them in more detail. Protectimus Ultra It is a physical (hardware) token that has a number of advantages as compared to other hardware tokens,...

Read More