Tag: multifactor authentication

Home » multifactor authentication
  • Adapta case studyHeightened security and privacy does not have to create a poor user experience In healthcare, where the security of patient data is critical, any digital transformation must be secure by design. “I have always been interested in privacy and in security,” says van Alphen. “I worked on that in my private life and I also […]Read morehealthcareMFAmultifactor authentication
  • Yubico LogoTechnology PartnersChanging the game with best-in-class partners We partner with AWS to ensure the highest levels of security by adding MFA for your privileged users, AWS IAM and root users. Microsoft and Yubico are on a mission to make phishing-resistant MFA the gold standard and are pioneering global authentication solutions. Combining strong MFA solutions with Okta’s […]Read moremultifactor authenticationtechnology partnershipYubico
  • 2021: Both challenging and promising for cyber security2021 was a challenging, yet promising year for cyber security. This past year, we saw critical infrastructure, which we may have taken for granted in the past, breached and disrupted. My father, who lives in Sweden, could not buy food in his local grocery store, and coworkers and friends on the east coast in the US […]Read moreMFAmultifactor authenticationpasswordlessphishingYubiKey
  • MFA implementation and the users you need to reach: overachievers, traditionalists and cautious employeesWhen a breach investigation team assembles after an incident at a company or organization, misinformed users often get added to the ‘suspects list’ because accidents happen that sometimes lead to holes in security. Though everyone in a company means well, just like accidentally dropping a glass or losing your car keys, the reality is that […]Read moreauthenticationdata breachMFAmultifactor authentication
  • Quick Take: Executive Order on Improving the Nation’s CybersecurityWith the recent number of attacks that have had significant impact on critical systems, a new executive order on improving the nation’s cybersecurity has been released, covering many key areas that need to be addressed to protect critical digital infrastructure. This is one of the most detailed U.S. executive orders on cybersecurity and we welcome […]Read moremultifactor authenticationphishingzero trust
  • Multi-factor authentication adoption – Yubico and 451 ResearchWithin a few days of last year’s pandemic shut down in March, the business world knew something had permanently changed about the workplace. Millions of workers flooded out of traditional office environments, perhaps never to return. Security professionals worldwide scrambled to make transitioning to remote work painless, but in many cases they weren’t prepared for […]Read moremultifactor authenticationpasswordless
  • Strong multi-factor authentication for first respondersHow the YubiKey ensures secure, simple, and portable access for first responders to Criminal Justice Information Services (CJIS) systemsRead moremultifactor authenticationstrong authentication
  • Yubico LogoWhat is a Smart Card?How does smart card authentication work? Smart card authentication requires two things: the smart card itself and a pin entered by the user. With smart cards there are two different ways to authenticate yourself into a system, there is either contact or contactless smart card readers. With contact cards, the embedded chip is inserted into […]Read moremultifactor authenticationPIVsmart card
  • Why strong authentication for every employee makes senseBy now, it’s an all-too-familiar routine… Step 1: Organization suffers an expensive and embarrassing security breach.  Step 2: Organization hastily introduces multi-factor authentication (or steps up its efforts to mandate its usage).  Oftentimes, it takes a breach to make organizations fully embrace strong authentication. But why? We know that usernames and passwords alone cannot provide sufficient security, and we know that SMS two-factor authentication (2FA) has been deprecated time […]Read morefeaturedmultifactor authenticationsecuritystrong authentication
  • Yubico LogoWhat is a Brute Force Attack?What are the goals of a brute force attack? The ultimate goal of a brute force attack is to steal password and login credentials to gain access to online accounts. After an attacker gains access it doesn’t stop there. They may use accounts to send out spam or phishing messages to other users. Another action […]Read moremultifactor authenticationphishingsecurity keyWebAuthn