why you should have a usb security key

NinFan

why you should have a usb security key

accessories, key, security, Spain, USB

Internet security has become an issue that more and more people are aware of in Europe. After all, it’s normal, since more and more people have to use an electronic device with connection to carry out part of their work, and it is necessary to know the risks to which they may be exposed.

Two-step verification has become one of the most used methods to add extra security when logging in on all types of platforms. This method consists, after the user has correctly entered their password, will have to pass a second verification method to confirm that this is the person who owns the account and not someone who simply discovered your password.

This check can be done in several ways. Some platforms like X, formerly Twitter, for example do not allow the use of SMS due to poor security, while others They recommend using verification apps like Google Authenticator or Microsoft Authenticator, there is however an alternative method that is a little more complex, but which also offers great security: USB keys.

What is a USB flash drive

This is one of the most secure two-step verification methods because It depends on a physical element which is this USB key. Instead of sending an SMS or writing an application code, the way to verify an action or connection using this method is to connect this drive to the USB port of your computer or cell phone.

The fact that it depends on a physical element means that we just need to keep this device with us so that no one other than us can authenticate on an account. Logically, if they guess our password and take it from us, they could get in, but it’s much more complicated must bypass the security of other authentication methods.

And, after all, it’s like having a digital ID to verify our identity. This also has the consequence that, just as with the identity document, It is extremely important to always keep it close at hand and not lose it or give it to another person., as this could have fatal consequences. The fact that they occupy the same size as a classic USB memory means that they are easily transportable but also that they can be lost from sight without too much difficulty, so you have to be careful with them.

In addition to logging into certain accounts or recovering your Google password, USB drives can have other uses, such as increase usage limits on certain apps and platforms even execute a signature on a legal document.

How do they work

Logically, to use them, the website, application or functionality must be compatible with this verification method, and you must also use the appropriate key, since there are several types. Most of these security keys use the Universal 2nd Factor protocol, U2F for its acronym, created by Google and Yubico. First of all, it also needs to be configured, because It must be associated with the account in question. You will usually need to set a password to access your device settings in the future, otherwise anyone finding your device could access your options.

In most cases, you will just need to try to log in to the site where it was set up and enter the password correctly. When you log in, the platform will ask the user to enter this two-step verification method, and In some cases it may be necessary to enter a password or press a button on this USB stick. After this, a digital signature will be generated and sent to the website to ensure that it is you who is signing in.

Yubico USB key

Yubico USB key

Yubico

After that, the USB drive will no longer be needed for anything else and It can be removed for safe storage in which we know that no one will be able to take it without our permission. One of its great virtues is that this verification method is resistant to phishing attacks, malware and keyloggers.

It’s a device that isn’t very expensive either and can be found on Amazon for a little over twenty dollars. Without a doubt, an investment that we can make and that is worth it in order to increase the degree of security we have when logging into certain accounts.

Leave a Comment