How to Backup Google Authenticator or Transfer It to a New Phone
Jun30

How to Backup Google Authenticator or Transfer It to a New Phone

Our regular readers know that we strongly recommend applying two-step verification wherever it’s possible. In the contemporary world, where database leaks are a standing affair, two-step authentication is not an option, it is, in fact, a must. If you use two-factor verification, an intruder would need to get both the unique password you came up with, and the gadget, which produces the verification codes, to break into your account....

Read More
Adaptive Authentication or How to Make 2FA Convenient for Users
Aug27

Adaptive Authentication or How to Make 2FA Convenient for Users

Any of us is interested in protecting confidential data from becoming the public domain on the web. Especially from people who are looking for such information for fraudulent purposes. The effective methods to avoid the invasion of online privacy are already known. And one of the most accessible ways is protecting access to your accounts with two-factor authentication. But… unfortunately, people don’t always use this...

Read More
How to Enable Protectimus Self-Service Portal
Jul02

How to Enable Protectimus Self-Service Portal

The Protectimus two-factor authentication service and on-premise platform offer a self-service feature that allows users to independently perform a number of actions related to issuing and managing their OTP tokens and their own data. The system administrator determines which actions are available to users. The list of possible actions includes: registration of new tokens;registration of existing tokens;re-assigning the...

Read More
5 Steps to Prepare your Business for Multifactor Authentication
May26

5 Steps to Prepare your Business for Multifactor Authentication

MFA is usually viewed as a sensible thing to have, and indeed, sometimes your partners or regulators can request setting multifactor authentication up before you can start operating at full capacity. Well, let’s dive into the main specifics of it! So, you are weighing all pros and cons regarding the implementation of MFA authentication in your business. And naturally, you are leaning towards making the best use of it. Setting...

Read More
Securing VPN with Two-Factor Authentication
Feb23

Securing VPN with Two-Factor Authentication

VPN, or virtual private network, is a popular and proven security tool used by companies across the globe to protect remote access to their corporate networks, especially today when almost every company switched to remote work, at least in part. VPN allows the creation of an encrypted link between a user and the company’s private server. And while this secures the corporate infrastructure from the direct attacks of malicious agents,...

Read More