Tag: cybersecurity
-
Hackers don’t break in. They log in. Cyber crime is surging like never before… 300% Rise in cyber crime since the pandemic began.1 59% Of companies have had a security breach in the last year.2 9 out of 10 Cyber attacks begin with a phishing email.3 Most cyber attacks begin as phishing Phishing is a cybercrime where attackers induce people to reveal […] Read more cybersecurity phishing phishing-resistant MFA -
Hackers don’t break in. They log in. Cyber crime is surging like never before… 300% Rise in cyber crime since the pandemic began1. 53% Of companies in Europe & the Middle East have been victims of cyber attacks2. 9 out of 10 Cyber attacks begin with a phishing email3. Most cyber attacks begin as phishing Phishing is the fraudulent practice of inducing […] Read more cybersecurity phishing phishing-resistant MFA -
Meeting enhanced cyber insurance requirements with strong authentication Cyber risk is becoming an ever-greater business liability, with 40% of business leaders reporting cyber threats as the No. 1 business risk. As a result, organizations have increasingly turned to cyber insurance to help them recover from damage or minimize impact. Read this whitepaper to learn about the changing cyber threat and cyber insurance landscape, and the best way to position your organization to qualify more easily for cyber insurance. Read more cyber insurance cybersecurity phishing-resistant MFA strong authentication -
Protecting retail and hospitality against cyber threats Learn how modernizing authentication can secure shared devices, protect sensitive data, and prevent account takeovers while enhancing customer experience. Read more cybersecurity modern authentication phishing-resistant MFA retail and hospitality YubiKey -
What is Executive Order 14028? Executive Order 14028 is a cybersecurity order issued by President Biden requiring agencies to improve and standardize defenses of their digital systems. The EO spawned a number of policy changes to improve software supply chain security, mandate Zero Trust cybersecurity principles, and phishing-resistant MFA. The recent frequency of widespread and invasive cyber attacks has prompted the government to take action. Read more cybersecurity Executive Order zero trust -
What is Account Takeover Learn the definition of Account Takeover and get answers to FAQs regarding: What is Account Takeover, how does it work, and more. Read more account takeovers cybersecurity phishing -
Cyber threats rise in Nordics in response to NATO applications The tragic events in Ukraine have forced neighboring states to suddenly reevaluate their defense policies. Finland, which shares over 1000km of border with Russia, is on high-alert while in recent months ordinary Swedes have rushed to join the Hemvärnet, Sweden’s military’s reserve force, in record numbers. Most notably, the threat of Russian attack has convinced […] Read more cybersecurity government MFA phishing-resistant MFA -
A cybersecurity roadmap for securing shared workstations Learn critical authentication requirements for shared workstations and devices, and best practices to ensure your organization stays protected against modern threats. Read more cybersecurity modern authentication shared workstation -
Q&A: Yubico’s SVP Fredrik Krantz on top cybersecurity trends The world of cybersecurity continues changing rapidly. This has been catalyzed by the sudden shift to remote work, the increasing threat of cybercrime and the complexity of attacks. Understanding the new technological landscape, and what comes next, can be challenging. Hearing from experts who spend their daily lives not only thinking about and facing these […] Read more CISO cybersecurity FIDO2 MFA phishing-resistant MFA YubiKey -
Modernizing authentication across energy and natural resource organizations Learn best practices to modernize cybersecurity across your critical IT and OT environments with Yubico solutions, to stop modern cyber threats and drive cyber insurance hygiene. Read more cybersecurity energy and natural resources modern authentication