Why USB Keys (Security Keys) Are No Longer Enough By Kevin Surace | 5 minute read USB Keys were step one. Token is the final step. The only way to stop phishing, spoofing, and relay attacks dead is biometric, proximity-based, phishing-proof hardware. Read more