{"id":3379,"date":"2018-09-19T18:03:10","date_gmt":"2018-09-19T15:03:10","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=3379"},"modified":"2019-06-12T14:57:23","modified_gmt":"2019-06-12T11:57:23","slug":"why-universities-choose-hardware-tokens","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/why-universities-choose-hardware-tokens\/","title":{"rendered":"Why US, Canadian, and EU Universities Choose Programmable Hardware OTP Tokens"},"content":{"rendered":"<p>Almost all universities and colleges in the US,&nbsp;Canada, and EU use two-factor authentication to protect their faculty and staff accounts.<\/p>\n<p>Quite often they choose <a href=\"https:\/\/www.protectimus.com\/blog\/10-most-popular-2fa-apps-on-google-play\/\">in-app 2-factor authentication<\/a>, which means that one-time passwords are generated on the users&#8217; smartphones. Though, in this case, <strong>they face a few issues<\/strong>:<\/p>\n<ol>\n<li>Not everybody agrees to use their personal smartphones for corporate needs.<\/li>\n<li>Some people still use old models of cell phones and can\u2019t download a 2FA app physically.<\/li>\n<li>When people use their own devices there is no guarantee that these devices aren\u2019t infected with viruses.<\/li>\n<\/ol>\n<p>Many universities turned to Protectimus for help describing the same situation. Among them are <strong>The George Washington University<\/strong>, <strong>Middle Tennessee State University<\/strong>, <strong>College of Central Florida<\/strong>, <strong>University of Guelph<\/strong>, <strong>Simon Fraser University<\/strong>, <strong>Old Dominion University<\/strong>, <strong>The University of Groningen<\/strong>, <strong>Trent University<\/strong>, etc.<\/p>\n<p>And actually, there is a simple solution (not to consider buying corporate smartphones for all the staff) &#8211; programmable hardware tokens <a href=\"https:\/\/www.protectimus.com\/slim-mini\/\">Protectimus Slim NFC<\/a>.<\/p>\n<p>These OTP tokens are programmed as if it was a 2FA app. Everything you need is one NFC enabled Android smartphone for the administrator. The admin scans the QR code with the secret key using <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.protectimus.totpburner.nfc&amp;hl=en\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">TOTP Burner application<\/a> and then flashes this secret key to the token via NFC. TOTP Burner app is available on Google Play for free. The administrator can program an unlimited number of tokens with one smartphone.<\/p>\n<p>So, <strong>with programmable hardware tokens<\/strong>:<\/p>\n<ol>\n<li>You don\u2019t have any troubles with people who don\u2019t have a smartphone or don\u2019t want to use their own device at work.<\/li>\n<li>You don\u2019t worry about any malware. The hardware OTP token is a standalone device which works without Internet or GSM connection. So the user can\u2019t infect this device even if they want to.<\/li>\n<li>The administrator is the only person who knows and stores the secret keys. It\u2019s not possible to pull the secret key out of the token.<\/li>\n<\/ol>\n<p>Besides, we offer custom branding for any number of <a href=\"https:\/\/www.protectimus.com\/slim-mini\/\">Protectimus Slim NFC<\/a> tokens starting from a single piece. Check the custom branded tokens our customers already use.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"shadow-img aligncenter wp-image-4699 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Programmable-hardware-OTP-tokens-Protectimus-Slim-NFC-1.jpg\" alt=\"Programmable hardware token Protectimus Slim NFC with custom branding\" width=\"800\" height=\"500\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Programmable-hardware-OTP-tokens-Protectimus-Slim-NFC-1.jpg 800w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Programmable-hardware-OTP-tokens-Protectimus-Slim-NFC-1-300x188.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Programmable-hardware-OTP-tokens-Protectimus-Slim-NFC-1-768x480.jpg 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Programmable-hardware-OTP-tokens-Protectimus-Slim-NFC-1-610x381.jpg 610w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"shadow-img aligncenter wp-image-4700 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Hardware-token-Protectimus-Slim-NFC-Middle-Tennessee-State-University-1.jpg\" alt=\"Reprogrammable security token Protectimus Slim NFC with custom brandinf for Middle Tennesse State University\" width=\"800\" height=\"450\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Hardware-token-Protectimus-Slim-NFC-Middle-Tennessee-State-University-1.jpg 800w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Hardware-token-Protectimus-Slim-NFC-Middle-Tennessee-State-University-1-300x169.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Hardware-token-Protectimus-Slim-NFC-Middle-Tennessee-State-University-1-768x432.jpg 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Hardware-token-Protectimus-Slim-NFC-Middle-Tennessee-State-University-1-610x343.jpg 610w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"shadow-img aligncenter wp-image-4701 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Hardware-security-token-Protectimus-Slim-NFC-custom-branding-PreHCM-Services-1.jpeg\" alt=\"Reflashable OTP token Protectimus Slim NFC with custom branding for PreHCM Services\" width=\"800\" height=\"450\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Hardware-security-token-Protectimus-Slim-NFC-custom-branding-PreHCM-Services-1.jpeg 800w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Hardware-security-token-Protectimus-Slim-NFC-custom-branding-PreHCM-Services-1-300x169.jpeg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Hardware-security-token-Protectimus-Slim-NFC-custom-branding-PreHCM-Services-1-768x432.jpeg 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Hardware-security-token-Protectimus-Slim-NFC-custom-branding-PreHCM-Services-1-610x343.jpeg 610w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"shadow-img aligncenter wp-image-4702 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Reflashable-hardware-token-Protectimus-Slim-NFC-custom-branding-Kela-1.jpeg\" alt=\"Programmable security key Protectimus Slim NFC with custom Branding for KELA\" width=\"800\" height=\"450\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Reflashable-hardware-token-Protectimus-Slim-NFC-custom-branding-Kela-1.jpeg 800w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Reflashable-hardware-token-Protectimus-Slim-NFC-custom-branding-Kela-1-300x169.jpeg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Reflashable-hardware-token-Protectimus-Slim-NFC-custom-branding-Kela-1-768x432.jpeg 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/09\/Reflashable-hardware-token-Protectimus-Slim-NFC-custom-branding-Kela-1-610x343.jpeg 610w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<h2 style=\"text-align: center;\">Read also:<\/h2>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"text-align: left;\"><a href=\"https:\/\/www.protectimus.com\/slim-mini\/\">Read more about Protectimus Slim NFC tokens or order few pieces to test<\/a><\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/www.protectimus.com\/blog\/program-protectimus-slim-nfc\/\">How to Program Protectimus Slim NFC Token<\/a><\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/www.protectimus.com\/blog\/google-authenticator-backup\/\">How to Backup Google Authenticator or Transfer It to a New Phone<\/a><\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/www.protectimus.com\/blog\/byod-security-rules\/\">10 Basic BYOD Security Rules<\/a><\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/www.protectimus.com\/blog\/7-tips-from-phishing-scams\/\">Top 7 Tips How to Protect Yourself from Phishing Scams<\/a><\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/www.protectimus.com\/blog\/social-engineering-why-it-works\/\">Social Engineering: What It Is and Why It Works<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Almost all universities and colleges in the US,&nbsp;Canada, and EU use two-factor authentication to protect their faculty and staff accounts. Quite often they choose in-app 2-factor authentication, which means that one-time passwords are generated on the users&#8217; smartphones. Though, in this case, they face a few issues: Not everybody agrees to use their personal smartphones [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":5009,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[9],"tags":[16,194,335,139,99],"class_list":["post-3379","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-protectimus-products","tag-2fa","tag-protectimus-en","tag-protectimus-slim-nfc-en","tag-tokens","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=3379"}],"version-history":[{"count":11,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3379\/revisions"}],"predecessor-version":[{"id":5010,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3379\/revisions\/5010"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/5009"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=3379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=3379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=3379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}