Hardware Security Keys

Many online account takeovers can be prevented. Consider using a hardware key for more secure multi factor authentication when logging into your personal and business accounts.

I frequently receive complaints of social media and cryptocurrency account takeovers. These takeovers result in damage to brand reputation and cryptocurrency theft. Many times threat actors bypass SMS text authentication with an attack known as SIM swapping to takeover the victim's cell phone account and intercept their SMS verification numbers. Hardware keys can strengthen the security of your business or personal accounts.

Hardware keys, such as YubiKey and Google Titan, are physical devices that provide an extra layer of security for online accounts. They are often used as a form of multi factor authentication (MFA), which require you to use the hardware key in addition to your password to log into an account. Hardware keys can also be used with an app on your cell phone to generate one time password (OTP) codes which are more secure than using SMS text messages.

One of the main benefits of using a hardware key is that it is much harder for threat actors to compromise. This is because hardware tokens use authentication standards like FIDO2 that have cryptographic key pair credentials. These credentials are not shared across services, and are very resistant to phishing attacks.

To use a hardware key, it is plugged into a USB port on your computer or phone. Some hardware tokens can also be used with NFC (near field communication). The hardware keys can also be configured to require a PIN code in addition to having the key being plugged in.

Hardware keys are becoming increasingly popular as more people become aware of the risks of online security breaches. They offer an easy and secure way to protect many accounts.

I've been using Yubikeys for a few years now, and they have been very good. I purchased two hardware keys, one is used daily while the other is secured as a backup. Most hardware keys are durable enough to be used on a keychain.

Previous
Previous

Shopping Sites Can Exploit Your Personal Info

Next
Next

As companies strive to protect their assets, employee background investigations are an essential tool