Tag: strong authentication

  • Image of a lock on a keyboardStrong authentication that supports zero trust initiativesLearn the five key strong authentication best practices that can support your organization’s zero trust security initiativesRead morestrong authenticationzero trust
  • How will authentication standards evolve in 2021 and beyond?Authentication standards development is like a slow-moving, winding river. It often takes years of dedicated work to reach new milestones, yet it feeds the entire security ecosystem and sustains digital workflow safety throughout the enterprise. While the benefits of this river are often invisible to the end-user, CISOs and developers are thinking about the river’s […]Read moreFIDO2PIVstrong authenticationWebAuthn
  • Strong multi-factor authentication for first respondersHow the YubiKey ensures secure, simple, and portable access for first responders to Criminal Justice Information Services (CJIS) systemsRead moremultifactor authenticationstrong authentication
  • Strong Authentication for U.S. Health Services ProviderHealthcare provider uses YubiKeys + MyID to develop strong authentication at scale.Read morehealthcarestrong authentication
  • Why strong authentication for every employee makes senseBy now, it’s an all-too-familiar routine… Step 1: Organization suffers an expensive and embarrassing security breach.  Step 2: Organization hastily introduces multi-factor authentication (or steps up its efforts to mandate its usage).  Oftentimes, it takes a breach to make organizations fully embrace strong authentication. But why? We know that usernames and passwords alone cannot provide sufficient security, and we know that SMS two-factor authentication (2FA) has been deprecated time […]Read morefeaturedmultifactor authenticationsecuritystrong authentication
  • YubiKey tips for authentication in healthcare – YubicoRead the strong authentication best practices for healthcare organizations to protect against phishing attacks and account takeoversRead morehealthcarestrong authentication
  • Yubico LogoYubiKey 5 SeriesHighest assurance authentication that’s fast and easy Strongest 2FA A physical security key, that can be added to a keychain and plugged into a computer, tablet or mobile device, adds an extra layer of protection on top of passwords to offer the strongest second factor authentication protection against phishing attacks.  Strongest MFA Users can combine […]Read moresecurity keystrong authenticationwwykYubiKey 5
  • Yubico LogoComputer login toolsSecure Windows with strong authentication Windows offers multiple login options. Read below to see which one applies to you. Local accounts If your user account is local and not managed by Entra ID, you can add a layer of protection beyond passwords with the YubiKey. Before installing the Yubico Login for Windows software, please make […]Read moreActive Directorymacstrong authenticationwindows
  • Yubico LogoYubiKey for TechnologyHighly secure tech IT solutions for progressive companies High tech companies experience the highest number of cyber attacks. Bad actors are relentlessly trying to acquire technological IP – patents, code, trade secrets, and strategic plans. With the YubiKey, technology companies can avail of high security ROI while stopping account takeovers and keeping critical technology IP […]Read moreenterprise securitystrong authentication
  • Yubico LogoStrong Authentication for Call CentersThe ideal hardware security key to secure data against phishing and improve agent productivity YubiKeys offer phishing-resistant multi-factor and passwordless authentication for in-person, hybrid, and remote call center environments ensuring data security and high productivity. Many global regulations such as PCI DSS call for mobile-free environments across call centers as using mobile phones for authentication […]Read morecall centerstrong authentication