Category Archives: Opinion

Latest in the authentication video series

So many users are now moving to our tokenless solution that we created a series of videos for you to enjoy the concepts of what you could do with the old tokens when you no longer need these dated plastic … Continue reading

Predictions for the year ahead

New Year’s Resolution(s): As the new year begins, the papers are full of predictions and tips on how to become a better, slimmer, smarter, more successful version of yourself. It is a time for new beginnings and earnest resolutions that often … Continue reading

Enjoy a firework with us this New Year

Find your old token on the next Firework – Happy New Year.Say ‘Goodbye’ to tokens and ‘Hello’ to tokenless.SecurEnvoy, the inventors of tokenless authentication. Enjoy a little fun with us:      

If tokens are too easy to forget, here’s the alternative

When you leave the token behind it is time to move to the real alternative – tokenless – it just works! How many times do you leave the token at home when you are traveling, or on the desk, even … Continue reading

Tokens and children don’t always mix …….

Its that season to consider access and working remotely. Authenticate yourself using your device with SecurEnvoy and not plastic fobs! This time of year, with new gadgets finding their way into the home and kitchen, they say never mix work … Continue reading

Mothers maiden name ……..

Mother’s maiden name? Favourite film star? Companies rightly take security very seriously, but why on earth do they make it so hard? Take your average online bank, retailer or social media site; they will ask you to set up a username and … Continue reading

Remote working – “can I call you when I’m back in the office?”

You know the situation. You get a call from a client or a manager who needs to discuss a matter right now, but you don’t have the information at your fingertips. The information you need is on the office computer, … Continue reading

Security; you choose – your device and your way!

Everybody hates passwords. People either have one that’s easy to guess (and therefore insecure), or one of those fiendishly complicate ones with lots of £, & and $ signs in that are impossible to remember. Either way, passwords present a … Continue reading

The role of SMS in user authentication

Online systems require a mechanism to ensure that whoever is accessing them is a legitimate user. For many systems, it is enough for users to enter their username and password to verify their identity. Security in such a situation can be … Continue reading

Multi factor authentication doesn’t need to be hard

  There was a time when two-factor authentication was a major undertaking. New servers had to be installed, security tokens had to be purchased, distributed and registered to their owners and then Support desks had to be created to handle … Continue reading