How does 2-factor authentication work?
Dec24

How does 2-factor authentication work?

Any more or less experienced Internet user came across 2FA at least once. But not everyone understands how it works. To use this powerful data protection tool more effectively let’s learn more about it. The first factor of 2-factor authentication – what we know Two-factor authentication starts with the usual standard password used for signing in on any website. Usually, the users themselves choose the password to create an...

Read More
Hardware or Software Token – Which One to Choose?
Dec11

Hardware or Software Token – Which One to Choose?

Striving for maximum versatility and convenience is the main trend of our time. It triggers a general affection (which often borders on addiction) for smartphones. For a modern person, these small devices embody the principle “All that is mine, I carry with me”. A regular phone has now become a mini laptop computer, which also enables you to make calls (but it is no longer its leading feature). Since any computer should...

Read More
Protectimus team at Startup Crash Test #2
Sep05

Protectimus team at Startup Crash Test #2

September 4 in Kharkiv was held a non-profit event Startup Crash Test #2. The main purpose of the event was to test the strength of the startups, which took part in it. Startups’ teams had a chance to talk about their ideas and marketing strategies. They heard a lot of constructive criticism from IT professionals. And they learned several useful tips that can help them to achieve success in the future. The Protectimus Company became...

Read More