Image for post
Image for post

VPN two-factor authentication adds another layer of security to the primary method of authentication (password), Protectimus 2FA solution can be connected to any VPN service with the help of the RADIUS protocol using the Protectimus RProxy component

VPN, or virtual private network, is a popular and proven security tool used by companies across the globe to protect remote access to their corporate networks, especially today when almost every company switched to remote work, at least in part. VPN allows the creation of an encrypted link between a user and the company’s private server. And while this secures the corporate infrastructure from the direct attacks of malicious agents, VPNs themselves are still open to hacker intrusion. Here’s where VPN two-factor authentication comes into play.

Multi-factor authentication, or MFA, mitigates multiple VPN security risks, protecting the VPN from unauthorized…


Image for post
Image for post

Tools you need for remote work, IT security threats you should be aware of when working remotely, and cybersecurity tips for remote working

Remote work is a blessing for some people and a real curse for others. In this article, we have collected all the tips to help you organize remote work in your company. We are talking about task trackers, modern communication tools, and the organization of remote access to corporate servers at the same time. We used all our experience to make this difficult task easier for you.

What’s important, when organizing a home office for your employees, you should think about cybersecurity. We are ready to help you with risk management to avoid potential hacker attacks and protect all remote…


keylogger — what is it
keylogger — what is it

There are hundreds, if not thousands, types of malware spread online. Out of them all, keyloggers can legitimately be considered the worst. We are not being dramatic here. If you get infected with a keylogger virus you basically show the hackers everything typed on the keyboard. Passwords, credit card credentials, messages, everything you search for, all of it gets to be exposed and easily stolen.

Read on to learn:


sms authentication
sms authentication

It’s delightful to see that more and more websites, apps and services employ MFA and even make this type of log-in protection a mandatory feature. What makes us a bit concerned, is that a huge portion of those websites still opt for SMS 2fa. Despite the facts that SMS verification has too many limitations and has been proven to be a lot less secure as any other two-factor authentication method. In fact, NIST (the National Institute of Standards and Technology) has issued a recommendation to replace SMS authentication with other types of MFA back in 2016. We do believe that…


Image for post
Image for post

Programmable OTP token Protectimus Flex comes in the form of a key fob with a battery life indicator, which makes it more comfortable to use, and more durable

You asked, and we delivered — the new programmable TOTP token Protectimus Flex in a key fob format is already here!

Unlike our other popular programmable hardware token Protectimus Slim NFC, the new Protectimus Flex TOTP token comes in the form of a key fob. This makes our latest two-factor authentication hardware token more comfortable to use, and more durable. The security token can easily be fastened to your keys, this way you won’t forget it, or lose it. There is a bonus feature in the new gadget — it has a battery indicator. …


Image for post
Image for post

A comprehensive comparison of cloud vs on-premise multi-factor authentication solutions to help you choose the best MFA for your business

The basic idea behind any type of multi-factor authentication is communication between an MFA device and a server. An MFA server can be set up either on-premise (locally within your company’s infrastructure) or in a cloud. Both approaches have their pros and cons. In this post, we aim to give you a comprehensive comparison of cloud multi-factor authentication vs on-premise 2FA solutions to help you choose the best 2-factor authentication for your business.

How 2-Factor Authentication Works

Unlike single-factor authentication, which requires only a passcode, multi-factor authentication requires two, or all three of the next determinants:

  • Something you know, which is your user password;

Image for post
Image for post

Elon Musk twitted that Tesla app two-factor authentication is now on the way: why is it good, and what tokens are better to use for Tesla 2FA

Without a doubt, Tesla’s electric cars are the best vehicles on the market right now. They attract people with modern design, high efficiency, and the low cost of maintenance and operation. These vehicles are generally considered pretty theft-proof, thanks to always-on GPS which lets owners track their cars. But numerous smart features still make these cars extremely vulnerable to hacking. That’s how the two-factor authentication has become one of the most awaited things among Tesla users.

The good news is that the Tesla CEO Elon Musk has recently twitted that 2FA is now on the way. …


Image for post
Image for post

In this post, you’ll learn how to pay less for the multi-factor authentication, and what features make it more userfriendly and reliable

MFA or multi-factor authentication by definition is a technology that limits access to a user account unless the user presents two or more pieces of evidence that prove that they are who they claim to be, moreover, the evidence must be of different natures: something they know, something they have or something they are. Overall, the process is regarded as helpful, as it is a solution to many security threats including phishing, brute force, keyloggers, some cases of social engineering and MITM attacks. …


Image for post
Image for post

We developed two products for Outlook OWA 2FA: the first product is Protectimus OWA, developed specifically for Office OWA integration; the second solution is Protectimus DSPA which adds 2FA directly to Active Directory

If you read this article, you probably know the answer to the “what is OWA” question. But just in case — OWA Outlook is a browser email client to access Microsoft Outlook without any on-premises installations for Exchange 2013, Exchange 2010 users. For Microsoft Outlook update for Microsoft Exchange 2016 it was rebranded as “Outlook on the web”. OWA Outlook online provides access not only to email, but to other personal information like calendar, contacts, and tasks, and is widely used by businesses all over the world. With such sensitive data involved, OWA two-factor authentication becomes imperative.

We developed two…


Image for post
Image for post

Providing our services, we often highlight that Protectimus is a coordinate partner of the OATH Initiative and that all our tokens and two-factor authentication software are OATH-certified. Not everybody is aware, however, of what the Initiative for Open Authentication (OATH) is and what its major goals are. That’s why we decided to clarify all the details concerning the OATH definition — its tasks, algorithms, and overall contribution to open authentication which is so important and useful today.

What is OATH?

In a nutshell, OATH — Initiative for Open Authentication — promotes the industry-wide implementation of strong authentication based on a single reference architecture…

Protectimus

Two-factor authentication solutions for business. Secure your organization’s and user’s data with MFA: https://www.protectimus.com/

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store