Tag: multifactor authentication
-
Adapta case study Heightened security and privacy does not have to create a poor user experience In healthcare, where the security of patient data is critical, any digital transformation must be secure by design. “I have always been interested in privacy and in security,” says van Alphen. “I worked on that in my private life and I also […] Read more healthcare MFA multifactor authentication -
Technology Partners Changing the game with best-in-class partners We partner with AWS to ensure the highest levels of security by adding MFA for your privileged users, AWS IAM and root users. Microsoft and Yubico are on a mission to make phishing-resistant MFA the gold standard and are pioneering global authentication solutions. Combining strong MFA solutions with Okta’s […] Read more multifactor authentication technology partnership Yubico -
2021: Both challenging and promising for cyber security 2021 was a challenging, yet promising year for cyber security. This past year, we saw critical infrastructure, which we may have taken for granted in the past, breached and disrupted. My father, who lives in Sweden, could not buy food in his local grocery store, and coworkers and friends on the east coast in the US […] Read more MFA multifactor authentication passwordless phishing YubiKey -
MFA implementation and the users you need to reach: overachievers, traditionalists and cautious employees When a breach investigation team assembles after an incident at a company or organization, misinformed users often get added to the ‘suspects list’ because accidents happen that sometimes lead to holes in security. Though everyone in a company means well, just like accidentally dropping a glass or losing your car keys, the reality is that […] Read more authentication data breach MFA multifactor authentication -
Quick Take: Executive Order on Improving the Nation’s Cybersecurity With the recent number of attacks that have had significant impact on critical systems, a new executive order on improving the nation’s cybersecurity has been released, covering many key areas that need to be addressed to protect critical digital infrastructure. This is one of the most detailed U.S. executive orders on cybersecurity and we welcome […] Read more multifactor authentication phishing zero trust -
Multi-factor authentication adoption – Yubico and 451 Research Within a few days of last year’s pandemic shut down in March, the business world knew something had permanently changed about the workplace. Millions of workers flooded out of traditional office environments, perhaps never to return. Security professionals worldwide scrambled to make transitioning to remote work painless, but in many cases they weren’t prepared for […] Read more multifactor authentication passwordless -
Strong multi-factor authentication for first responders How the YubiKey ensures secure, simple, and portable access for first responders to Criminal Justice Information Services (CJIS) systems Read more multifactor authentication strong authentication -
What is a Smart Card? How does smart card authentication work? Smart card authentication requires two things: the smart card itself and a pin entered by the user. With smart cards there are two different ways to authenticate yourself into a system, there is either contact or contactless smart card readers. With contact cards, the embedded chip is inserted into […] Read more multifactor authentication PIV smart card -
Why strong authentication for every employee makes sense By now, it’s an all-too-familiar routine… Step 1: Organization suffers an expensive and embarrassing security breach. Step 2: Organization hastily introduces multi-factor authentication (or steps up its efforts to mandate its usage). Oftentimes, it takes a breach to make organizations fully embrace strong authentication. But why? We know that usernames and passwords alone cannot provide sufficient security, and we know that SMS two-factor authentication (2FA) has been deprecated time […] Read more featured multifactor authentication security strong authentication -
What is a Brute Force Attack? What are the goals of a brute force attack? The ultimate goal of a brute force attack is to steal password and login credentials to gain access to online accounts. After an attacker gains access it doesn’t stop there. They may use accounts to send out spam or phishing messages to other users. Another action […] Read more multifactor authentication phishing security key WebAuthn