Five Strategies to Scale Phishing-Resistant MFA in 2023 – Yubico

Legacy multi-factor authentication (MFA) has not worked against modern cyber threats due to inability to stop phishing and other account takeovers. Modern MFA, such as YubiKeys, have been proven to stop phishing attacks and account takeovers in their tracks. 

Only solutions based on Smart card/PIV or FIDO protocols are truly phishing-resistant according to the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-63. Phishing-resistant MFA processes rely on cryptographic verification between devices or between the device and a domain, making them immune to attempts to compromise or subvert the authentication process. They require each party to provide evidence of their identity, but also to communicate their intention to initiate through deliberate action.

Below are five ways Yubico can help your business implement phishing-resistant security keys easily and efficiently.

  1. Adoption

Think you can’t afford phishing-resistant hardware security keys?

With YubiEnterprise Subscription you can get leading authentication for less than the price of a cup of coffee per month per user, and easily upgrade to the latest YubiKeys. Calculate your own potential savings and see the business value of YubiKeys.

Trying to figure out how to handle business churn?

YubiEnterprise Subscription includes an additional 25% of YubiKey entitlements per year to address employee turnover, lost keys, and upgrade requests. As your business evolves, we can help you navigate these scenarios.

  1. Usability

What if my users just don’t like YubiKeys and don’t want to carry one more thing?

YubiKeys are used by millions of consumers and thousands of businesses around the world. Leading publications give YubiKeys strong reviews, and well-known and respected brands such as Hyatt and Google use YubiKeys to provide strong security without making it difficult and cumbersome for users.

We all carry keys and a wallet. Wouldn’t you be open to carrying one more thing if it protected you from losing your online identity? YubiKeys can.

In fact, a recent Yubico survey looking at the top global authentication trends found that within the last 2 years, nearly 40% of respondents admitted to having broken their mobile phone and nearly 30% having lost it. As referenced earlier, mobile phones are a device organizations commonly use to authenticate either via SMS, mobile authentication apps or OTPs, and when lost it’s much more expensive to replace a phone than a YubiKey.

Wondering what happens when users lose their YubiKeys?

This is our most frequently asked question! Think of your YubiKey as a debit card. Just as there are processes in place when you misplace your debit card, similarly, processes exist if you lose your YubiKey. 

The services you’re using the YubiKey with will typically have alternative authentication mechanisms which allow users to regain access to the account and de-associate the lost YubiKey from your account. You can then register another YubiKey to your account. Most services allow users to configure multiple YubiKeys with their account, so we highly recommend a primary and a backup YubiKey, just like you have for your house or car!

Worried about how to drive user adoption on new technology?

YubiKeys are super simple to use. Yubico can provide set up instructions for your users and get them familiar with the why and the how of modern strong authentication that protects their personal and work accounts and stops them being easy targets.

  1. Distribution

Want to get keys out to users globally?

YubiEnterprise Delivery can help you get keys out to 49 countries around the world to corporate and residential addresses. Let us take care of all the logistics. See how customer BeyondTrust was able to accelerate security to combat emerging threat vectors.

Wondering where to store all the keys?

With YubiEnterprise Delivery, you can order keys as and when you need them. We can help you with inventory management so that you don’t have to worry about finding space for your new keys.

  1. Integration

Have a hybrid, complex environment and don’t know where to start?

YubiKeys work out of the box with over 700 on-premises and cloud applications and services, including Microsoft, Okta, Ping and Duo/Cisco environments. This means a low-touch deployment for IT. YubiKeys are also highly self-service with no need for IT to individually provision YubiKeys for each user, unlike older archaic deployment models.

  1. Management

Trying to figure out how to deploy and manage YubiKeys?

Our experts can provide turnkey services and guidance to easily deploy YubiKeys through your organization, from key registration to establishing ongoing key management policies, to user training and support, all the way to reporting.

Have any further questions about modern Smart Card/FIDO-based security keys and how to get started deploying YubiKeys across your organization? Find out more about Yubico’s phishing-resistant MFA protection here or contact our sales team directly here.

Talk to our teamTalk to our team

Share this article:


  • Introducing new features for Yubico Authenticator for iOSWe’re excited to share the new features now available for Yubico Authenticator for iOS in the latest app update on the App Store. Many of these improvements aim to address frequently requested features from our customers, while providing additional new functionalities for a seamless authentication experience on iOS.  With increased interest in going passwordless and […]Read moreiOSYubico Authenticator
  • Platform independent digital identity for all Many are understandably concerned that the great invention called the Internet, initially created by researchers for sharing information, has become a major threat to democracy, security and trust. The majority of these challenges are caused by stolen, misused or fake identities. To mitigate these risks, some claim that we have to choose between security, usability […]Read moreDigital IdentityEUDIFounderStina Ehrensvard
  • Q&A with Yubico’s CEO: Our move to the main Nasdaq market in StockholmAs 2024 draws to a close, it’s the perfect time to reflect on the incredible journey we’ve had this year and how it has shaped where we stand today as a company. To mark this moment, I sat down with our CEO, Mattias Danielsson, to look back on the milestones and achievements of 2024—culminating in […]Read moreCEOMattias Danielsson
  • Exploring DORA: A look at the next major EU mandateFinancial institutions have historically managed operational risk using capital allocation, but under EU Regulation 2022/2554 – also known as the Digital Operational Resilience Act (DORA) – the financial sector and associated entities in the European Economic Area (EEA) must also soon follow new rules. These new rules focus on the protection, detection, containment, and the […]Read moreDORAEU