BLOG

Read our blog about the latest trends on mobile computing and best practices on safe and secure computing

2-factor authentication, what’s that I can hear you say? Over? What have I missed?

2-factor authentication, what’s that I can hear you say? Over? What have I missed?

Well don’t worry as we will explain Put hopefully (very) simply, We’d strongly encourage everyone reading this post to use 2-factor authentication whenever you can.  Most online services including LinkedIn now offer account holders this extra safety feature. Why they don’t offer it by default I don’t know but that we can discuss in anotherRead more about 2-factor authentication, what’s that I can hear you say? Over? What have I missed?[…]

Who is the April Fool? 1-Step too far when 2-step is required.

Who is the April Fool? 1-Step too far when 2-step is required.

Usually, Google enters into the April 1st tomfoolery with an excellent and often funny gotcha. This year, however, they took it 1-step too far and it went badly wrong. So we would like to write about 2-step which we hope you will read. It’s really difficult to catch the public’s eye and try and offerRead more about Who is the April Fool? 1-Step too far when 2-step is required.[…]