Social networks are an abundance of information, both public and personal. Personal information is mainly open only to a certain circle of users who are on the list of friends. But if the account is hacked, this information may become available to everyone on the Internet, including attackers who can use it for their own purposes. There are several common causes for hacking accounts.
Eight years have passed since Google implemented two-factor authentication (2FA),owa two factor authentication but almost no one uses it so far. In 2018, Software Engineer of the company Grzegorz Milka made a presentation at Usenix’s Enigma IT Conference. He showed sad numbers of how ordinary users care about their security: approximately 10% of active Google clients use 2FA and only about 12% use password managers. Surprised? Probably, it is time to think about the usage of 2FA.
Computers, digital marketing, e-commerce, governments of different countries, regulators and censors, various sites — all of them receive info about you on the Internet. They create databases for various purposes, using your information as they want. In most cases, this is done to increase the time you spend online by making you interested in advertising, content and other resources on a topic of interest. In the worst case, attackers can use this data to violate your personal boundaries. How to protect yourself from them?
According to statistics, every third small organization is subjected to cyber-attacks. Less than 50% of companies seek to secure information on the Internet, and only a few of them regularly update their security systems. As a result, this leads to serious material problems.
In connection with the widespread use of computers, the user has to think about the security of the processed information. The first step in securing is to authenticate a legitimate customer. Most often, a password is used as a verification tool. Besides, more than 60% of users, as practice shows, apply the same passwords to different systems. Needless to say, this significantly reduces the level of security. What to do? One way to solve such a problem is to use external authentication keys.