What is cybercrime?

Buy now Back to the overview ! What is cybercrime? Cybercrime are criminal offenses that lead to conventional criminal offenses through the use of information technology. Why is cybercrime so dangerous? The perpetrators can carry out criminal activities and harm victims on the other side of the world. There are more and more end devices […]

What does FIDO mean?

Buy now Back to the overview ! What does FIDO mean? Fido stands for Fast Identity Online, i.e. a fast identity for digital connections. This FIDO alliance has developed various standards to enable a secure and uncomplicated login experience. One industry standard is U2F, based on challenge-response authentication. This procedure is based on knowledge. One […]

Biometric authentication

Buy now Back to the overview !   What is biometric authentication? Biometric authentication can provide more security. Instead of the traditional login with user name and password, an additional factor or even a sole biometric factor is used. This includes, for example, registration via fingerprint or the well-known Face ID from Apple.  With biometric […]

Authentication, authentication and authorization

Buy now Back to the overview ! What is the difference between authentication, authentication or authorization? All three terms are frequently used in connection with an application. Although they sound similar, they have different meanings. As they are closely linked and are often confused, we explain them in one entry. What do authentication, authentication and […]

2fa in the company

Why two-factor authentication also makes sense for companies User accounts and passwords have had their day when it comes to protecting sensitive data. In payment transactions and for many online services, double security via two-factor authentication has long been standard. However, stricter data protection regulations and increased home office remote access mean that proof of […]

Applications with 2fa

Unternehmen Zwei-Faktor-Authentisierung

How two-factor authentication protects cloud and SaaS services Many companies use cloud and SaaS services to process personal data or sensitive information such as payment data. However, the responsibility for the security of this data remains with the company – not the provider. Nevertheless, two-factor authentication, an additional layer of security in proving the identity […]

TOTP one-time passwords

How TOTP one-time passwords secure sensitive corporate data Time-based one-time passwords (TOTP for short) add another component to log-in via user name and password and secure sensitive company data via two-factor authentication (2FA). But how do time-based one-time passwords actually work and what advantages does a hardware authenticator offer? Whether it’s business applications such as […]

Manage 2FA with TOTP keys in KeePass

KeePass

How KeePass works as a back-up for a TOTP authenticator A TOTP authenticator that scans QR codes makes the switch to secure 2FA log-ins and one-time passwords much easier. But what happens if the authenticator is lost? Then the only thing that helps is a backup of all keys and passwords. A password manager like […]