Author: Yubico Team
-
What’s guarding your domain from unauthorized access? Domains are a frequent target for phishing attacks that pose serious privacy risks and potential losses of millions of dollars in brand damage, lost revenue, stolen data, and recovery efforts. The threat of phishing greatly underscores the need to protect the front door to your domain. We are excited to announce that Gandi is the […] Read more 2FA Works with YubiKey -
Spotting Phishing Emails: 5 Key Signs Before You Click – Yubico Guide Phishing attacks are now considered the main source of data breaches. 91% of cyber attacks start with a phishing email * Ten years ago, if you asked someone what ‘phishing’ was, they probably would have no idea. Since then, times have changed considerably; phishing attacks are now responsible for a significant number of major data […] Read more account takeovers phishing yubico.com -
Find your perfect YubiKey match At Yubico, we love security. As we approach Valentine’s Day, we’re reminded of this, and we want to share the love! From February 12 to 18, we are offering a 25% discount on the purchase of two single YubiKeys (Hint: keep reading). Share the second key with a loved one or use it as a […] Read more YubiKey -
PetitionThat with the YubiKey Today, the World’s Largest Developer Expo + Conference, DeveloperWeek 2018, opens at the Oakland Convention Center with thousands of developers participating from all over the globe. As a warm up for the conference, hundreds of developers participated in the DevWeek 2018’s hackathon and pulled an all-nighter on Saturday. Over 160 teams coded and collaborated for […] Read more about Yubico YubiKey -
5 Best Practices for Companies Serious About Data Privacy If you caught this month’s earlier blog, you’ll know that Yubico is partnering with the National Cybersecurity Alliance to support Data Privacy Day, which takes place on January 28. Protecting privacy is one of the main end goals of a security program. It’s incredibly important to us at Yubico to empower and educate individuals and […] Read more data breach MFA security -
5 Common Ways Hackers Steal Online Credentials – Yubico This month, Yubico is partnering with the National Cybersecurity Alliance (NCSA) to support and promote Data Privacy Day, an initiative to empower individuals and encourage businesses to respect privacy, safeguard data, and enable trust. While Data Privacy Day is a one-day event taking place on January 28, security is our focus at Yubico every day, […] Read more password managers phishing security U2F -
Is there a good way to share passwords in an enterprise? One of the most important facets of enterprise security is ensuring protection for all employee accounts. Password sharing methods play a critical role. When pressed for time, many users resort to sending unencrypted plain-text passwords via high risk channels like chat or email. There are other ways to securely share passwords across teams throughout an […] Read more enterprise security password managers YubiHSM -
2FA – not just for employees, but vendors as well Protecting your organization from a potential data breach starts with providing secure two-factor authentication (2FA) for all employees. Once employees are protected, you need to think about vendors and third parties that have access to your network, customer files, and other sensitive data. Do they have the appropriate protections put in place? According to a […] Read more 2FA enterprise security Works with YubiKey -
Ecosystem Showcase: How ID proofing, identity federation, and strong authentication protect digital identities According to the NIST SP 800-63-3, digital identity is “the online persona of a subject.” Unlike personal identity, an individual can convey multiple digital identities across various networks and communities. In other words, one person can have one digital identity for their work email and another for a social media account. Given the possibility of […] Read more FIDO U2F security key identity and access management -
Security and compliance—a top priority for Sentry Organizations that outsource certain business functions to Software-as-a-Service (SaaS) providers enjoy many benefits, including cost efficiency and increased productivity. However, despite the advantages, there also comes the potential risks of privacy and data compromise. Due to the nature of cloud computing, SaaS providers are required to take necessary steps and precautions to prove the security, […] Read more compliance Works with YubiKey