Securing VPN with Two-Factor Authentication
VPN, or virtual private network, is a popular and proven security tool used by companies across the globe to protect remote access to their corporate networks, especially today when almost every company switched to remote work, at least in part. VPN allows the creation of an encrypted link between a user and the company’s private server. And while this secures the corporate infrastructure from the direct attacks of malicious agents,...
New Programmable TOTP token Protectimus Flex
Listen to this article You asked, and we delivered – the new programmable TOTP token Protectimus Flex in a key fob format is already here! Unlike our other popular programmable hardware token Protectimus Slim NFC, the new Protectimus Flex TOTP token comes in the form of a key fob. This makes our latest two-factor authentication hardware token more comfortable to use, and more durable. The security token can easily be fastened to...
Two-Factor Authentication Solutions Comparison: Google Authenticator vs. Protectimus
People often ask us to compare the Protectimus two-factor authentication solutions with Google Authenticator and explain how we’re better. In this article, we’ll try to answer these questions. Firstly, keep in mind that Google Authenticator is only a one-time password generator app. One of our tokens, the Protectimus Smart OTP, works similarly to this app. However, in any authentication system, what really matters is not...
Remote Work: How to Transition Team to Working From Home During the COVID-19 Pandemic
In this article, we’ve gathered everything you need to know about remote work. We share our own experiences and talk about how to organize remote access to company resources, how to protect the accounts of users who are working from home, what remote team working tools you can use for communicating and managing tasks, and how to keep in touch with your remote teams. Working remotely during the pandemic is not a mere trend....
TOTP Tokens Protectimus Slim NFC: FAQ
The first programmable TOTP tokens Protectimus Slim NFC were released just a couple years ago. Since then, we’ve received hundreds of orders, as well as hundreds of questions about how it works, how programmable security key differs from the classic one, how to program tokens, and whether or not using this kind of OTP token is secure. In this article, I’ll explain how classic TOTP hardware token and programmable TOTP token...