Tag: 2FA

Home » 2FA
  • Yubico LogoWhat is 2 Step Verification?Learn the definition of 2 Step Verification and get answers to FAQs regarding: What is 2 Step Verification, Benefits of 2SV and 2SV vs 2FA.Read more2 step verification2FA2SVsecurity
  • YubiKey as a smart card on iOSCertificate-based smart cards have been one of the most trusted and proven implementations of multi-factor authentication for over 20 years. There’s only one problem… the typical credit card-shaped smart card didn’t work well, if at all, on mobile devices without additional hardware and software.  Today, smart cards come in many form factors, from a credit […]Read more2FAsmart cardYubico AuthenticatorYubiKeyYubiKey 5YubiKey FIPS Series
  • Yubico LogoYubico for SMBsGet started with phishing-resistant YubiKey MFA for your favorite services and applications Small and medium-sized businesses underestimatethe risk of a cybersecurity breach 1 in 3 breaches involved an SMB. 52% of SMBs experienced at least one cyberattack in the last year. Of them, 10% experienced more than 10 cyberattacks. 40% do not have a comprehensive […]Read more2FAsmb
  • A Day in the Life: Dispelling the Myths of Mobile AuthenticationCOVID-19 initiated the most rapid digital transformation ever witnessed—organizations fast-tracked two-factor and multi-factor authentication to transition millions of employees to work from home. But with remote and hybrid work likely to continue in 2022 and beyond, it’s time to step back and ask: is my in-use authentication as secure as I think it is? Is […]Read more2FAauthenticationMFAmobile authenticationphishing
  • In passwordless authentication, who is holding the keys?Strong authentication practices are based on validating a number of authentication factors to a relying party (RP) or identity provider (IDP) to prove you are who the RP expects. Examples of relying parties could be Dropbox or Salesforce. Identity providers, who can also be a relying party that interacts with the authenticator, include Microsoft Entra […]Read more2FAauthenticationFIDO2MFApasswordless
  • federal webinar photoSecuring America’s Supply ChainLearn best practices for the federal government and the energy sector as they modernize security across critical infrastructure and their supply chains.Read more2FAsecuritysupply chain
  • Making the internet safer for everyone, one YubiKey at a timeWhen the internet was designed 30 years ago, security was not a priority as it was primarily created as a way to connect and easily share information with others around the world. Fast forward to today with news of hacks and breaches almost daily, much of the online world is trying to play catch up […]Read more2FAauthenticationGoogleYubiKey
  • Why Financial Services Shouldn’t Wait for Regulators to Address Strong AuthenticationFinancial institutions face some of the most stringent and complex regulatory requirements, including financial service compliance requirements around authentication. So much so that the financial service industry is broadly considered the gold standard from a compliance perspective. To comply with existing regulations and thwart cyber attacks, financial institutions were early adopters of two-factor authentication (2FA) […]Read more2FAcompliancefinancial services
  • Yubico LogoWhat is Yubico OTP?How does Yubico verify Yubico OTPs? In order for Yubico OTP to work with YubiCloud (Yubico’s validation service) the information programmed into the YubiKey must also be uploaded to the YubiCloud. As part of the process of manufacturing every YubiKey, a Yubico OTP credential is programmed into slot 1, and its information is also transferred to YubiCloud, […]Read more2FAOTPyubico.comYubiKey 5
  • Yubico LogoWhat is One-Time Password (OTP)?How do one-time passwords work? OTPs are delivered in many ways, usually via an object the user carries with him, such as his mobile phone (using SMS or an app), a token with an LCD-display, or a security key. OTP technology is compatible with all major platforms (desktop, laptop, mobile) and legacy environments, making it a very […]Read more2FAOTPsecurity key