Messente avatar logo

Every business needs to know about data protection

- 5 MIN READ - 24 Feb 2015

Recent high-profile data breaches have become a permanent concern to many private and public organizations.

As the amount of information stored in cloud is growing exponentially new opportunities arise in both positive and negative directions. But a company can’t start protecting its users data unless it doesn’t know what to protect. So a new way of understanding data protection takes its place as advanced technologies and policies are being adopted to protect our valuable data.

Technology identifies us

Today there are more mobile devices than there are people on earth. This number is multiplying five times faster than our population. Our saved passwords, fingerprints, browser history, face recognition, or any other similar data are in many cases more valuable than the device itself. And this way of identification has in many cases become a default condition to, for example, apply for a loan, transfer money, or login to your bank account. So our connectivity devices have strongly started to change the way we understand the opportunities that lie within them.

Minimizing every possible threat

Starting to understand what needs to be protected is definitely a challenging task to any company. Appropriate safeguards can be used in different confidentiality impact levels. So not all personal data should be protected in the same manner. In many cases, it might be necessary to limit the requisite data to accomplish your security and business purpose. As Heartbleed happened the main questions was how to avoid this happening again. There is always the unpredictable factor of human mistake, so what can be done to limit the possibility of accidentally mistreating sensitive data?

Could 2-factor authentication help?

One of the recent hottest topics in cyber security is 2-factor authentication (2FA). Some big names such as Dropbox or LinkedIn have had their lesson with extensive security breaches that resulted in adopting 2FA. More and more companies who work with sensitive data pick up this topic rather at earlier stage to prevent becoming a victim of another massive password leak. So, what do you need to know about 2FA? Impelling your users to adopt 2FA solution will vastly minimize the risk of hacking a single password. Instead, 2FA makes sure that only the user has the access for the key by sending it to their mobile device via different channel such as SMS.

Even more, the password is generated only when the user triggers it and expires after a short time to minimize the leaking possibilities even more. And last but not least, as 2FA uses your mobile device it’s more likely that other layers of security are being used as well, such as passcode or fingerprint protected lock screen. While SMS remains as a secure and reliable technology, 2FA via SMS is surely one of the fastest and securest ways to protect your users sensitive information.

Messente is at Mobile World Congress

If you are going to attend Mobile World Congress at Barcelona on 3rd until 5th of March, don’t hesitate to contact our team (team@messente.com) to learn more about 2-factor authentication and how your business can use it.

Margus Sütt

Margus Sütt - Key account manager

Margus works as a business analyst at Messente. Identifying new opportunities and going deep into industries Margus consults Messente's key customers to help their businesses to advance.

Startup Conferences: What’s the point? (Slush 2017)

20 Oct 2017

With Slush coming up in about a month, it’s a good time ponder the purpose of large startup conferences. Many entrepreneurs head to conferences, like Slush, around the world and throughout the year looking for investments from venture capitalists and angel investors, yet there’s a lot more to gain from startup conferences. Think about it: there will be over 17,000 motivated and creative people in one place at one time. Get creative and gain as much as you can out of the experience.

Yuriy Mikitchenko

Yuriy Mikitchenko

The economics behind undelivered, failed SMS messages    

17 Oct 2017

The cost and full impact of undelivered or failed messages isn’t immediately clear. The financial impact is not simply the combination of the failed SMS and the cost to resend the message, which isn’t very much at times. There are other indirect costs that result from undelivered SMS messages that matter from a financial perspective. Let’s take a deeper look into the ripple effect of undelivered messages, which make the reasons behind our focus on SMS delivery quality even more clear.

Here are a few examples.

Uku Tomikas

Uku Tomikas

Fraud and Security: 2FA Considerations for PSD2

10 Oct 2017

The second Payment Services Directive (PSD2) is less than three months away from enforcement. While the regulation’s text is lengthy, a key component of the law is its extended reach in comparison to the first directive. PSD2 applies to all payment service providers and affiliates, including account information service providers and payment initiation service providers. In addition, the law applies when at least one part of the transaction is in the European Union. This means that payment service providers and their affiliates outside of the EU must comply with the law when the payer is in the EU. The additional geographical reach guarantees the same level of security expectations for all EU residents regardless of the location of the payment service provider.

Raili Liiva

Raili Liiva

Start sending messages to

for € N/A

Contact us