2FA for solid protection of accounts and data

B2B Cyber ​​Security ShortNews

Share post

The need to use a 2-factor authentication solution, i.e. the multi-step process for verifying an identity when logging in, is now indispensable. 2FA is one of the fundamental anchors of any defense strategy.

Bitkom has just published a study that shows that two-factor authentication has not yet become established, although it massively increases security. Unfortunately, many still rely on complex passwords.

Bitkom determines: Still passwords instead of 2FA

When creating passwords, three quarters of Internet users in Germany (74 percent) pay attention to complex passwords that contain a mix of letters, numbers and special characters, making it difficult to guess. But that is fewer than a year ago, when 83 percent took appropriate care. This is the result of a current survey commissioned by the digital association Bitkom. Wherever possible, two-factor authentication should be used. This means that attackers cannot access online accounts using the password alone, which significantly increases security.

Fast protection for companies

It is all the more important that the solution used is well integrated into the usual work process, can be flexibly adapted to different scenarios and is of course secure against any kind of manipulation and attacks. Combining these goals was the basis for developing the tetraguard 2FA solution.

Short facts of the tetraguard 2FA solution

  • Setup in 20 minutes
  • as well as simple and cost-effective integration into existing IT environments
  • Works with every smartphone
  • possible with any USB stick
  • Meeting compliance requirements
More at tetraguard.de

 


About tetraguard systems

tetraguard systems GmbH is the leading provider of hardware and software in the area of ​​IT security both internally and externally. The company became known through the development of IT security products for Microsoft Windows® platforms. With the patent-pending, self-protecting software series “tetraguard®” and its proven functions, the aim is to further automate the processes and products for IT security and simplify them for the user, supported by artificial intelligence.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more