Tag: data breach
-
How phishing-resistant MFA stops cyberattacks in healthcare Ransomware attacks and other types of cyberattacks in healthcare are growing, not only in amount, but in sophistication as well. The recent State of Ransomware in Healthcare report released by Sophos highlighted a 94 percent increase in ransomware attacks in 2021, with 66 percent of healthcare organizations hit by ransomware – up from 34 percent […] Read more data breach FIDO2 healthcare phishing-resistant MFA YubiKey -
MFA implementation and the users you need to reach: overachievers, traditionalists and cautious employees When a breach investigation team assembles after an incident at a company or organization, misinformed users often get added to the ‘suspects list’ because accidents happen that sometimes lead to holes in security. Though everyone in a company means well, just like accidentally dropping a glass or losing your car keys, the reality is that […] Read more authentication data breach MFA multifactor authentication -
What SolarWinds taught us about the importance of a secure code signing system Last year’s SolarWinds attack was caused by intruders who managed to inject Sunspot malware into the software supply chain. The hackers exploited a breach in the SolarWinds code signing system, which allowed them to fraudulently distribute malicious code as legitimate updates to installations across the world. While this attack taught the industry many lessons, one […] Read more data breach developers Yubico Developer Program YubiHSM YubiHSM 2 -
Cloud vs. On-Prem: Why on-prem can bring your next data breach Most CISOs and IT teams spend their time asking themselves “when”, not “if”, they will be the next company to suffer a data breach. And rightfully so. The frequency of data breaches is skyrocketing, with no sign of slowing down. To help quantify the problem, recent research from Canalys shows that there were more records […] Read more data breach digital transformation identity and access management -
What is a Data Breach? How Do Data Breaches Happen? Read how you can educate yourself and your company on best practices to stop breaches here Data breaches by the numbers (source: Verizon 2020 Data Breach Investigation Report) Read more account takeovers data breach passwordless -
PAUSD in Palo Alto Secures Students with YubiKeys – Yubico PAUSD protects against breaches of their student information system and other applications. Read more data breach education YubiKey 5ci -
Swansea University Secures Database Access with YubiKey Swansea University medical school rapidly rolls out program to protect sensitive research data. Read more data breach education healthcare -
Department of Defense contractor case study Stringent DoD security requirements make the YubiKey the authentication hardware of choice. Read more data breach government -
Responding to the rising wave of social engineering attacks against remote workers By now, it’s clear the pandemic has provided perfect conditions for many types of social engineering attacks. We’ve seen plenty of reports and warnings from the FBI, CISA, Interpol, and other reputable organizations about the growth in coronavirus-related attacks, from spear-phishing to vishing, ransomware, and more, as the world adapts to remote working and its associated risks. In many ways, social […] Read more data breach enterprise security phishing remote workers -
4 reasons to consider a security-first approach to product development The internet is a powerful invention. It was originally built for collaboration, but it’s far surpassed the capabilities anyone could have expected, and has become a core function of society. As developers, we contribute to these incredible advancements every day, but it’s also our job to help protect and preserve the future of the internet. […] Read more data breach security
1
2
Next Page