Google expands USB-C Titan security keys to 10 countries

The tech giant aims to shore up customer and enterprise accounts with security keys available through the Google Store

Google is making its Titan Security Keys available in the UK, Europe and beyond in a bid to boost consumer and enterprise security. 

The USB-C keys use cryptography to verify a user's identity and a separate URL to stop would-be attackers from accessing accounts even if they have the username and password. 

Related Resource

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks

Download now

They come with a second layer of authentication that makes them resistant to phishing, according to Google, and are also built to work on with other vendors, so you're not locked into the tech giant. 

Titan security key bundles with USB-A/NFC and Bluetooth/USBNFC keys were made available in Germany, Switzerland, Austria, Spain and Italy last year. 

Now USB-C Titan keys are on sale via the Google Store to customers in the UK, Canada, France, Japan, Germany, Switzerland, Austria, Spain and Italy for the first time. 

The announcement also means that more enterprise customers can enrol onto Google's Advanced Protection Program. This is a safeguard for personal Google accounts that protects against targeted accounts. Within the programme, users can set limits on data access and add extra verification to block fraud.  

"Security keys provide the strongest protection against phishing attacks," Google Cloud product manager Christiaan Brand wrote in a blog post. "That's why they are an important feature of the Advanced Protection Program that provides Google's strongest account protections for users that consider themselves at a higher risk of targeted, sophisticated attacks on their personal or work Google Accounts."

Last May it was revealed that a misconfigured Bluetooth pairing protocol could have potentially allowed hackers to hijack accounts. Google issued replacements following the discovery of the vulnerability that exposed users accounts within Bluetooth range. 

In a world where weak and reused passwords are all too common, making use of hardware security keys could be the panacea to poor password practices putting valuable data at risk from savvy hackers

Featured Resources

The definitive guide to warehouse efficiency

Get your free guide to creating efficiencies in the warehouse

Free download

The total economic impact™ of Datto

Cost savings and business benefits of using Datto Integrated Solutions

Download now

Three-step guide to modern customer experience

Support the critical role CX plays in your business

Free download

Ransomware report

The global state of the channel

Download now

Recommended

Iboss protects web sessions with remote browser isolation
Cloud

Iboss protects web sessions with remote browser isolation

16 Aug 2021
Most CISOs worry cloud software flaws aren’t being caught
cloud security

Most CISOs worry cloud software flaws aren’t being caught

7 Jun 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

17 Sep 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

17 Sep 2021