None of Google's 85, 000 Employees Have Been Phished in More Than a Year After Company Required Them to Use Physical Security Keys For 2FA

'Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity. From the report: Security Keys are inexpensive USB-based devices that offer an alternative approach to two-factor authentication (2FA), which requires the user to log in to a Web site using something they know (the password) and something they have (e.g., a mobile device). A Google spokesperson said Security Keys now form the basis of all account access at Google. "We have had no reported or confirmed account takeovers since implementing security keys at Google," the spokesperson said. "Users might be asked to authenticate using their security key for many different apps/reasons. It all depends on the sensitivity of the app and the risk of the user at that point in time." The basic idea behind two-factor authentication is that even if thieves manage to phish or steal your password, they still cannot log in to your account unless they also hack or possess that second factor.' -- source: https://tech.slashdot.org/story/18/07/23/1944236 Cheers, Peter -- Peter Reutemann Dept. of Computer Science University of Waikato, NZ +64 (7) 858-5174 http://www.cms.waikato.ac.nz/~fracpete/ http://www.data-mining.co.nz/

On Tue, 24 Jul 2018 11:53:56 +1200, Peter Reutemann quoted:
'Security Keys are inexpensive USB-based devices that offer an alternative approach to two-factor authentication (2FA)...'
Sounds like what YubiKey did, before they abandoned Open Source. <https://news.ycombinator.com/item?id=13635818>
participants (2)
-
Lawrence D'Oliveiro
-
Peter Reutemann