-
Forging ahead: A CISOs top recommendations to stay secure in 2023
Last year, we anticipated that 2022 would be challenging for cybersecurity. This was proven true with the countless number of sophisticated high-profile phishing and ransomware attacks like DropBox, Twitter, Rockstar Games and Uber (twice). With the introduction of phishing-as-a-service and other sophisticated toolkits that target weaker forms of 2FA, security teams are now prioritizing phishing […]
Read more -
2022: A year of phishing with a solution to calm the seas
In 2022, phishing scams continued to hook into consumers and enterprise accounts. In fact, recent research from EMA revealed that 87% of surveyed businesses indicate that their organization experienced an identity-related security breach in the preceding 12 months. Many successes of the sophisticated phishing scams were due to legacy MFA implementations such as SMS, mobile […]
Read more -
An inside look: How hackers rely on low effort tactics for phishing attack success
Phishing continues to make headlines with attackers using stolen credentials to gain access to valuable systems and sensitive data. Although phishing has been a known technique for a long time, the industry is still struggling to effectively defend against it. This may seem surprising to many as “phishing” calls to mind poorly written emails, generic […]
Read more -
Hackers don’t break in. They log in.
Cyber crime is surging like never before… 300% Rise in cyber crime since the pandemic began1. 53% Of companies in Europe & the Middle East have been victims of cyber attacks2. 9 out of 10 Cyber attacks begin with a phishing email3. Most cyber attacks begin as phishing Phishing is the fraudulent practice of inducing […]
Read more -
Phishing attacks are on the rise: are you prepared?
It doesn’t have to be Cybersecurity Awareness Month to read a flurry of news about human-based phishing attack stories – also called smishing if the “fishing line” is cast via SMS. These attacks boil down to the art of tricking people into revealing personal information and credentials – including usernames, passwords, authentication codes, and sensitive […]
Read more -
Thoughts on modern cybersecurity for retail and hospitality in advance of RH-ISAC’s Cyber Intelligence Summit
Recently Derek Hanson, vice president and product evangelist at Yubico, spoke with Paul Malcomb, cyber threat intelligence analyst and engagement lead at Retail and Hospitality ISAC (RH-ISAC), on their podcast. Derek shared insight on how passwordless authentication using FIDO and phishing-resistant MFA can help retail and hospitality organizations accomplish business goals such as ensuring strong […]
Read more -
Account Takeover
Learn the definition of Account Takeover and get answers to FAQs regarding: What is Account Takeover, how does it work, and more.
Read more -
Securing shared workstations against modern cyber threats
Download the Yubico White Paper, to learn the key considerations for authentication across shared workstation environments such as call centers, manufacturing floors, retail and hospitality kiosks, medical stations, and others.
Read more -
Yubico’s top information security recommendations for 2022
Last week, we shared a look back at 2021, which experienced an increase in the number of high profile security breaches, many involving devastating ransomware attacks. Attackers preyed on traditionally softer targets like hospitals, schools, and local governments, in addition to the continued focus on the supply chain. Although the root cause for many of […]
Read more -
2021: Both challenging and promising for cyber security
2021 was a challenging, yet promising year for cyber security. This past year, we saw critical infrastructure, which we may have taken for granted in the past, breached and disrupted. My father, who lives in Sweden, could not buy food in his local grocery store, and coworkers and friends on the east coast in the US […]
Read more