Simple Questions about Online Security


PDF Consider the following questions carefully:



Remember, the Digi-ID™ can be used in a variety of different security situations, however the most common uses are for proving identity, digitally signing/sealing files and encrypting data or two factor authentication.

This is how the Digi-ID™ answers the above questions:

back to top

When you visit a web site, like your Bank’s for example, how do you know that it really is their web site?

If the Bank is serious about security, they will use a Digi-SSL™ Secure Web Server Certificate to prove its online web site identity.

back to top

When you download software from the Internet, how can you be sure that it really is from the original Publisher?

Using a Digi-Code™ Software/Code Signing Certificate, a pop up dialog box assures the user of the Publisher’s identity prior to download.

back to top

If you are sending a confidential email to someone, how can you be sure that they are the only person that can open it?

If the email is first encrypted using a Digi-ID™ for email [Digi-Mail™], then only the intended recipient can decrypt the email.

back to top

Your company has a Virtual Private Network [VPN], how can you replace password security with a stronger alternative?

Passwords can be copied and misused, however, if each user has a Digi-ID™, using Digi-Access™, security and identification is assured because this is strong two factor authentication.

back to top

When you make a payment over the Internet using your credit card, how can you be assured a hacker won’t steal it during transmission?

The same Digi-SSL™ that confirms the identity of the website, automatically encrypts any data that is submitted through it.

back to top

If your organization wishes to use the internet to have business forms / documents (legally binding) signed on line, how can you do this?

Again using the Digi-ID™, because the identity of the owner has been verified, they can use it to sign any digital file.

back to top

Your organization wishes to put some or all of its systems on line for suppliers, customers, etc. How can you securely control access to them?

Using a Digi-CA™ combined with Digi-Access™, the systems can be secured and all users can be verified before offering them the correct access level.

back to top