A laptop, book, mouse, and cellphone are wrapped up in a thick chain that is secured with a padlock.

A Beginner's Guide to Hardware Security Keys

The information security space can feel overwhelming. Which forms of 2 factor authentication are more secure? How does that tie into password management? What are these passkeys that are coming up in more services? My OS allows me to take advantage of this in their system. Why would I want to consider a 3rd party solution? This post is the first in a series of approachable privacy and security with the goal of breaking down different topics and tools to consider which ones may be helpful to people’s personal lives. It makes sense why businesses would stress the importance of good security—the average cost of a data breach in 2024 was $4.88 million. ...

May 27, 2025 · 13 min · Skyler Lemay