Tag: authentication


Mar 30, 2022
White House declaration: act now for cybersecurity attack protection
Last week, President Biden made a statement that couldn’t have been clearer in its message regarding cybersecurity attack protection to the private sector: “If you have not already done so, I urge our private sector partners to harden your cyber defenses immediately by implementing the best practices we have developed together over the last year …

Mar 10, 2022
Donating YubiKeys globally to those who need it most: A spotlight on Yubico’s Secure it Forward program
With current events unfolding daily around the world, the reality that everyone can be affected by impending cyberattacks has set in. Now, individuals around the world are wondering how to stay secure during tumultuous times like this (and in the future). So, what exactly are the best ways to secure oneself online and mitigate the …

Mar 3, 2022
Security considerations for the top 8 mobile device-restricted workplaces
When looking at enterprises and organizations, there are many different business scenarios that can be present when addressing secure authentication. Whether those be shared workstations, remote workers, or even privileged accounts, there is one in particular that introduces its own difficulties: mobile device-restricted workplaces. It’s safe to say that there will always be workplaces which, …

Feb 22, 2022
Privileged Access Management at CERN: Q&A with Dr. Stefan Lüders
In an era of increasing cyber attacks, how do you balance the desire for unrestricted research freedom against the need to protect that research from cyber threats? This is the challenge faced by CERN, leaders in the scientific research community. Their solution? Provide a clear articulation of what constitutes privileged data, and create flexible security …

The critical strong authentication need for privileged users: Why legacy authentication is putting your privileged users at risk
Step one in any effective cyber security program includes securing privileged accounts, credentials, and secrets with modern strong authentication. Download the Yubico White Paper, The critical strong authentication need for privileged users, to learn who really is a privileged user, and industry best practices to secure your privileged users against phishing attacks and account takeovers.

Jan 26, 2022
Salesforce is requiring MFA: Why this matters and what you can do
As sophisticated cyberattacks continue their relentless pursuit towards SMBs and enterprises, companies must prioritize improvements to their cybersecurity infrastructure to better secure their customers, employees, and partners. Username and passwords no longer provide adequate security against the ever evolving landscape of cyberattacks. Late last year, Salesforce took a strong and decisive stance, announcing that beginning …

Jan 18, 2022
Yubico’s top information security recommendations for 2022
Last week, we shared a look back at 2021, which experienced an increase in the number of high profile security breaches, many involving devastating ransomware attacks. Attackers preyed on traditionally softer targets like hospitals, schools, and local governments, in addition to the continued focus on the supply chain. Although the root cause for many of …

Dec 9, 2021
MFA implementation and the users you need to reach: overachievers, traditionalists and cautious employees
When a breach investigation team assembles after an incident at a company or organization, misinformed users often get added to the ‘suspects list’ because accidents happen that sometimes lead to holes in security. Though everyone in a company means well, just like accidentally dropping a glass or losing your car keys, the reality is that …

Dec 6, 2021
A Day in the Life: Dispelling the Myths of Mobile Authentication
COVID-19 initiated the most rapid digital transformation ever witnessed—organizations fast-tracked two-factor and multi-factor authentication to transition millions of employees to work from home. But with remote and hybrid work likely to continue in 2022 and beyond, it’s time to step back and ask: is my in-use authentication as secure as I think it is? Is …

Nov 18, 2021
In passwordless authentication, who is holding the keys?
Strong authentication practices are based on validating a number of authentication factors to a relying party (RP) or identity provider (IDP) to prove you are who the RP expects. Examples of relying parties could be Dropbox or Salesforce. Identity providers, who can also be a relying party that interacts with the authenticator, include Microsoft Azure, …