Author: Shamalee Deshpande

Home » Archives for Shamalee Deshpande
  • Securing mobile web app browsing for the U.S. military: Q&A with Jason Christensen and Alex AntrimWe’ve heard from customers and Yubico employees that have experienced first hand how difficult it can be for government employees to remotely and securely access essential web services like email, MyPay, and Defense Travel System. In the past, they would typically be required to login to a desktop, making access on the go essentially impossible. […]Read moreDepartment of DefenseDoDfederal governmentQ&Asmart card
  • How phishing-resistant MFA stops cyberattacks in healthcareRansomware attacks and other types of cyberattacks in healthcare are growing, not only in amount, but in sophistication as well.  The recent State of Ransomware in Healthcare report released by Sophos highlighted a 94 percent increase in ransomware attacks in 2021, with 66 percent of healthcare organizations hit by ransomware – up from 34 percent […]Read moredata breachFIDO2healthcarephishing-resistant MFAYubiKey
  • New cyber insurance requirements place high demands on educationThe education sector currently faces the highest volume of cyberattacks of any sector, with 60% of educational institutions (higher and lower) suffering ransomware attacks in 2021. Cyberattacks are a source of significant cost and can cause major disruption to school operations, which was the case of the recent attacks at UMass and Baltimore County Public […]Read morecyber insuranceK-12 cybersecurityMFAphishing-resistant MFAransomware
  • The real reason legacy authentication doesn’t work for shared workstationsMost organizations struggle with legacy authentication, with passwords and mobile-based solutions a source of security risk, high IT cost, and frustrated users. However, for organizations with shared workstations and shared device environments, these pain points are only intensified. Shared workstations—common across industries such as healthcare, manufacturing, retail and hospitality, financial services, energy, utilities, oil and […]Read moreauthenticationlegacy authenticationMFAshared workstation
  • Privileged Access Management at CERN: Q&A with Dr. Stefan LüdersIn an era of increasing cyber attacks, how do you balance the desire for unrestricted research freedom against the need to protect that research from cyber threats? This is the challenge faced by CERN, leaders in the scientific research community. Their solution? Provide a clear articulation of what constitutes privileged data, and create flexible security […]Read moreauthenticationMFAphishing-resistant MFAprivileged access manegementprivileged usersYubiKey
  • A Day in the Life: Dispelling the Myths of Mobile AuthenticationCOVID-19 initiated the most rapid digital transformation ever witnessed—organizations fast-tracked two-factor and multi-factor authentication to transition millions of employees to work from home. But with remote and hybrid work likely to continue in 2022 and beyond, it’s time to step back and ask: is my in-use authentication as secure as I think it is? Is […]Read more2FAauthenticationMFAmobile authenticationphishing
  • New administration and Covid-19 aftermath surges demand for next-gen security in public sector2021 marks the year that two game-changing events have put onboarding remote employees and strong authentication on the radar for many public sector agency heads. Since March 2020 most government workers, like everyone else, have been forced to work remotely in systems that were not designed for secure work-from-home situations. IT executives scrambled to find […]Read morePublic Sector
  • Why 3 government agencies are relying on hardware-based MFA with YubiKeysAmerica’s government is under attack. To put it more accurately, its governments are under attack, all the time, at every level — federal, state, and local — from opportunistic scammers, sophisticated cybercriminals, and even state actors. We’ve all seen the stories about intelligence services stealing political emails, snooping into election systems, and even penetrating the US power grid. But those are just […]Read morefeaturedfederal governmentgovernmentstate and local government