
The YubiKey 5Ci has been designed to work with a variety of different situations and specific types of software. The YubiKey 5Ci comes with instructions to log onto the Yubico website for instructions regarding setting up this product. Fortunately, and remembering my habit of misplacing small objects, there is a hole in the middle of the YubiKey's body that can be used to attach this YubiKey to a key ring, so that those with the same propensity as myself do not misplace it. At one end is a Type C USB connection while the other end features a Lightning connection.

At either end of the body are contact elements for attaching to the product under its protection. The main central body of the YubiKey 5Ci unit is protected by a permanent transparent fibreglass reinforced sheath. With dimensions of 41 x 12 x 5 mm (L x W x D), the YubiKey 5Ci is a small device of the type that I have a habit of misplacing especially when I really need it to perform its dedicated task of opening access to one of my mobile devices.

It then gives you access to the host device using a two-Step Verification process.

Although its appearance might seem a little strange, this YubiKey is really a flash or thumb drive in concept as it slots into an appropriate sockets. I have been looking at the YubiKey 5Ci product. The latest addition to this line-up is the company's Series 5 range. With offices in Australia, Germany, Singapore, the UK, America and Sweden, Yubico has developed a line up of protective offerings often referred to as YubiKeys and similar in concept to the dongle idea used several years ago when you would need to insert a device in order to gain access to a particular piece of software or service. This should re-enforce and give you an indication as to its importance if you did not already realise it.ĭifferent types of protection are available, including the approach taken by Yubico, a company founded in Sweden in 2007. You can be sure that those who have attempted, and maybe succeeded, in stealing your data will protect the information they have gathered. It is up to whoever owns the data, in the first place, to ensure that this valuable item is adequately protected. The corruption, theft or illegal access of your data could cost a great deal of money and affect numerous people in many different ways. Data is a valuable asset whether you are an individual or, more importantly, a business.
