27.02.2019 - Tags:

Two Factor Authentication

Again and again, millions of users are affected by security vulnerabilities. Two factor authentication can help to reduce the occurrence of identity theft, phishing attacks or other online scams. Because even if the password was cracked, hackers can be locked out and sensitive data is protected.

The proof of identity of the user is determined by a combination of two independent components, which must be used correctly. The three most common factors are usually specified as something that you know (Pin code) you have (bank card, physical key) and that you are (fingerprint, human voice). The combination does not necessarily have to consist of factors of different categories, but these must never be stored in the same place. Most often, one of the features is a physical token, while the other one is such as a security code, for example the combination bank card - PIN.

On secure computers it can be set to be asked for the code only the first time, for example at home on your PC or laptop. For sensitive accounts we recommend at least to establish the two factor authentication and thus to increase the protection of your data significantly.

captcha
Enter the letters from the image

Tag-Filter

18.03.2020 - Home office at the time of the corona pandemic [more...]

07.11.2019 - Judgment of the ECJ on (tracking) cookies [more...]

24.10.2019 - Environmental protection by aixzellent [more...]

02.10.2019 - End-to-end encryption (I): Increasing cooperations between IT companies and states – Is this the end of secure messaging in Germany? [more...]

11.06.2019 - Tracking Cookies - Currently still illegal! [more...]

15.04.2019 - Copyright law – What you should know [more...]

27.02.2019 - Two Factor Authentication [more...]

31.01.2019 - Static vs. dynamic website - which one is the right for your company? [more...]

30.10.2018 - Informational self-determination – the concept of decentralisation as an alternative to powerful data gathering companies [more...]

01.10.2018 - Nextcloud: Control is the key to security [more...]

Back