Backup Security: How Safe Is Your Backup?

Backup Security: How Safe Is Your Backup? And How to Make Sure It Actually Backs You Up. The airplane is slowly taxiing on the runway to the takeoff. You look at the airport through the window, relax in the seat and place your laptop in the forward compartment. The flight attendant gently taps your shoulder…

The Afterlife of Devices

How You Can Improve Your Device Authentication and Avoid Trouble After Your Personal Device Is Lost? What if it gets lost or stolen? This is the question we usually ask ourselves when buying a smartphone or tablet. We should also ask this question every time we install a banking app, set up corporate email on…

Hardware Authentication. A Year in Retrospective

Government-sponsored hacking reached absolutely new heights this year, overshadowing even major corporate hacks. Therefore, the public and experts started looking for solutions. This led to increased media attention to emerging forms of reliable end user authentication, including hardware-based wearable solutions. Then investors and corporate roadmaps also reacted, directing their attention to the hardware authentication market.

What is Wrong With the Browser Passwords?

Internet browser is the most used computer software. Besides browsing, we are increasingly using it for video chatting, creating spreadsheets and even brewing tea or watering gardens. Since late 1990-ies browsers are kindly asking if we would like them to save our passwords. However, is this option safe? Winston Churchill once compared trusting passwords to your…