Tag: MFA
-
White House declaration: act now for cybersecurity attack protection Last week, President Biden made a statement that couldn’t have been clearer in its message regarding cybersecurity attack protection to the private sector: “If you have not already done so, I urge our private sector partners to harden your cyber defenses immediately by implementing the best practices we have developed together over the last year […] Read more authentication Executive Order MFA phishing-resistant MFA YubiKey -
Security considerations for the top 8 mobile device-restricted workplaces When looking at enterprises and organizations, there are many different business scenarios that can be present when addressing secure authentication. Whether those be shared workstations, remote workers, or even privileged accounts, there is one in particular that introduces its own difficulties: mobile device-restricted workplaces. It’s safe to say that there will always be workplaces which, […] Read more authentication FIDO MFA mobile authentication phishing-resistant MFA WebAuthn -
Supply chain security in 2022 The SolarWinds and Colonial Pipeline security breaches are two (of many) incidents that have made supply chain attacks go mainstream. The primary challenge for businesses is that supply chain defense isn’t easy given the hundreds, if not thousands of entry points that need to be monitored along the way. But there are best practices that […] Read more cybersecurity government MFA supply chain YubiKey -
Privileged Access Management at CERN: Q&A with Dr. Stefan Lüders In an era of increasing cyber attacks, how do you balance the desire for unrestricted research freedom against the need to protect that research from cyber threats? This is the challenge faced by CERN, leaders in the scientific research community. Their solution? Provide a clear articulation of what constitutes privileged data, and create flexible security […] Read more authentication MFA phishing-resistant MFA privileged access manegement privileged users YubiKey -
Google Chrome U2F API decommission: What the change means for your users and how to prepare With advancement often comes change. Some changes are exciting, like providing new features and broader support, while other changes can be a minimal bump in the road or, in extreme cases, cause adverse effects on end users. With Yubico’s commitment to keeping our customers updated on the latest in changes to security protocols, we wanted […] Read more Google Google Chrome MFA U2F WebAuthn -
Salesforce is requiring MFA: Why this matters and what you can do As sophisticated cyberattacks continue their relentless pursuit towards SMBs and enterprises, companies must prioritize improvements to their cybersecurity infrastructure to better secure their customers, employees, and partners. Username and passwords no longer provide adequate security against the ever evolving landscape of cyberattacks. Late last year, Salesforce took a strong and decisive stance, announcing that beginning […] Read more authentication FIDO FIDO U2F MFA YubiEnterprise YubiKey -
Yubico’s top information security recommendations for 2022 Last week, we shared a look back at 2021, which experienced an increase in the number of high profile security breaches, many involving devastating ransomware attacks. Attackers preyed on traditionally softer targets like hospitals, schools, and local governments, in addition to the continued focus on the supply chain. Although the root cause for many of […] Read more authentication government MFA phishing privacy zero trust -
2021: Both challenging and promising for cyber security 2021 was a challenging, yet promising year for cyber security. This past year, we saw critical infrastructure, which we may have taken for granted in the past, breached and disrupted. My father, who lives in Sweden, could not buy food in his local grocery store, and coworkers and friends on the east coast in the US […] Read more MFA multifactor authentication passwordless phishing YubiKey -
MFA implementation and the users you need to reach: overachievers, traditionalists and cautious employees When a breach investigation team assembles after an incident at a company or organization, misinformed users often get added to the ‘suspects list’ because accidents happen that sometimes lead to holes in security. Though everyone in a company means well, just like accidentally dropping a glass or losing your car keys, the reality is that […] Read more authentication data breach MFA multifactor authentication -
A Day in the Life: Dispelling the Myths of Mobile Authentication COVID-19 initiated the most rapid digital transformation ever witnessed—organizations fast-tracked two-factor and multi-factor authentication to transition millions of employees to work from home. But with remote and hybrid work likely to continue in 2022 and beyond, it’s time to step back and ask: is my in-use authentication as secure as I think it is? Is […] Read more 2FA authentication MFA mobile authentication phishing