With 2024 being a leap year, this gives business an extra opportunity to “leap” toward reflecting, adjusting and aligning all aspects of their organization – including an increasingly critical area in cybersecurity. With bad actors and cyber attacks like phishing becoming increasingly sophisticated, enterprises need to stay ahead of evolving cyber threats and regulatory requirements […]
Read moreIf you immediately think of email when you think of phishing, you’re not alone. However, a new form of a text-based scam is making waves – highlighted by a seemingly legitimate text from the USPS which lets receivers know that their “package” arrived at the warehouse. To receive the package, it instructs users to click […]
Read moreWith the use of phishing-resistant multi-factor authentication (MFA) like passkeys growing more every day, it’s exciting to see the widely popular service, Microsoft 365, announce availability recently for passkeys on YubiKeys with mobile devices. This new Microsoft preview not only opens up support on iOS and iPadOS for Microsoft 365, but for a whole range […]
Read moreThis year, Yubico is continuing to focus on delivering phishing-resistant multi-factor authentication (MFA) to enterprises monthly at value and on a great scale through its YubiEnterprise Subscription offering. Today we’re excited to announce these latest updates, including: With these enhancements, YubiEnterprise Subscription continues to make it easy and flexible for enterprises to adopt phishing-resistant MFA […]
Read moreAs expected, 2023 was another challenging year for information security as organizations continued looking for ways to stay ahead of hackers. We saw an increasing amount and complexity of phishing attacks overall, driven by a major trend throughout the year making a significant impact: AI-driven phishing. Phishing remains the most prevalent attack method due to […]
Read moreEach new year brings the opportunity to create resolutions and begin new, good habits. While some may focus on gym routines or getting more sleep, an important resolution everyone should focus on this year is improving your cybersecurity habits. With a steady increase in targeted, high profile cyber attacks this year it’s now more important […]
Read moreDuring the holiday season, people flock online to complete their holiday shopping, book travel, and increase their social media posts. Unfortunately, cyber attackers know this as well, and phishing attacks, such as AI-based or QR code-based, introduces an added risk if you aren’t practicing good security hygiene during these active times. As the year comes […]
Read moreOver the last few weeks, the Australian government has made big strides in further bolstering its digital security posture by enacting major cybersecurity measures. Australia has a goal to be a global leader in cybersecurity by 2030, and these recent measures are making impactful steps toward reaching this mission. First, the government announced that myGov […]
Read moreCreating a robust data encryption strategy in a multi-cloud environment can be challenging. Considerations like availability, fail-over, control, cost and compliance are crucial. For organizations that are encrypting data on-premises and considering moving data to the cloud, a typical approach is to use an on-premises Hardware Security Module (HSM) or a cloud-based HSM. However, acquiring […]
Read moreEvery November, Critical Infrastructure Security and Resilience (CISR) Month focuses on educating the vital role critical infrastructure plays in the nation’s well being. Led by Cybersecurity and Infrastructure Security Agency (CISA), the conversation centers around why it’s important to strengthen critical infrastructure security and resilience. One of the critical infrastructures, energy and natural resources, is […]
Read more