Works with YubiKey Spotlight: ‘Secure Your World’ with YubiKeys this Cybersecurity Awareness Month

October is Cybersecurity Awareness Month – an important time of the year dedicated for the public and private sectors to work together to strengthen cybersecurity practices globally. The Cybersecurity and Infrastructure Security Agency (CISA) continues the theme of ‘Secure Our World’ with recommendations for businesses and consumers to stay safe from the increasing threat of cyber attacks – including a focus on adopting modern multi-factor authentication (MFA) as a key way to stay secure.

Most cyber attacks are a result of stolen login credentials, but there remains a gap in action toward passwordless as well as an extensive underutilization of effective tools like MFA. In fact, a recent Yubico survey found that despite being the least secure form of authentication, the most common method of authentication is still username and password. Clearly, continued education around cybersecurity best practices and cyber tools available are more critical than ever.

Phishing attacks continue to stand out as one of the most prevalent and dangerous forms of cyber attacks – businesses around the world continue facing increasing threats from phishing and social engineering attacks, which are made even easier with the advancements of AI, deepfakes, and voice cloning. In the face of these threats, now is the time to move to a phishing-resistant, passwordless future. 

At Yubico, we recognize the critical need for modern, phishing-resistant security solutions which includes using device-bound passkeys on YubiKeys. Whether you’re an individual safeguarding your personal accounts or a business leader securing an enterprise environment, our catalog offers integrations to the tools you need to stay productive, secure and free from the threats of cyber attacks. The Works with YubiKey catalog is our evolving, extensive collection of platforms, applications, devices and services that enable authentication with the YubiKey.

Here are a few real-world examples of how the YubiKey integrates with solutions featured in the Works with YubiKey catalog. First, let’s take a look at some of our featured and newly added listings from the Works with YubiKey catalog that, combined with the YubiKey, can secure your world today.

Featured listings

Secure your world with phishing-resistant users

Traditional security measures like phishable MFA (i.e. SMS, push notifications and one-time passcodes) and heavy reliance on user education are insufficient against sophisticated phishing tactics, highlighting the need for stronger defenses and a new mindset and approach around building a phishing-resistant enterprise. This is why enterprises need to instead think of equipping their users with the type of authentication that offers phishing-resistance no matter which business scenario they are engaged in or platforms or devices they are using. In order to truly prevent phishing attacks, organizations must do more than just invest in phishing-resistant authentication – there must be an investment in developing phishing-resistant users. 

Given that users often move across platforms (i.e. Apple, Google, Microsoft), devices (smartphones, laptops, tablets) and between personal and corporate apps and services in the course of their day, many conventional authentication techniques are inherently phishable. The only effective approach to removing phishing from an organization’s threat landscape is to ensure that every user and process within the organization becomes phishing-resistant. Secure authentication that moves with users across all devices, platforms, and services – no matter how they work – is a critical component of good cyber posture. 

Phishing-resistance in registration, authentication, and recovery processes are key for cultivating phishing-resistant users, and it all starts and ends with deploying the highest-assurance modern hardware security keys: YubiKeys. With our expert guidance, enterprise subscriptions and turnkey delivery services, distributing YubiKeys and onboarding users across an enterprise can be seamless. 

The Works with YubiKey catalog, featuring our trusted partner solutions, provides a comprehensive approach to security, helping to ensure phishing-resistance is achieved regardless of which services your organization uses. Whether you’re an individual or an enterprise, YubiKeys – together with our partners’ solutions – can help you stay ahead of cyber threats and protect your valuable information.

Talk to our teamTalk to our team

Share this article:


  • CEO Corner: Entering the second half of 2025 with momentumAs we continue to move further into the second half of 2025, I want to share a look back at our journey so far this year and as well as lay out Yubico’s strategic path ahead.  Resurgence in order growth and key segment wins While net sales declined for Q2, the end of the quarter […]Read moreCEOCEO CornerEarningsMattias Danielsson
  • Survey says: Your dog’s name isn’t a passwordWe all know we should be protecting our digital lives, but what are Americans actually doing? Yubico recently commissioned a survey, conducted by Talker Research, which asked 5,000 Americans in 10 major metro cities across the U.S. about their online security habits. Here’s a closer look at what they found (hint: they’re not as secure as they […]Read moreCompany Newssurvey
  • Passkeys are winning, but security leaders must raise the barPasswords are on their way out. In their place is a new form of login called passkeys that promises stronger security and less frustration. All passkeys offer the rare combination of improved usability and stronger security, especially when compared to passwords alone. But unless we act now, millions could be left more vulnerable than ever. […]Read moreDevice-bound passkeysHardware passkeypasskeyssynced passkeys
  • Your top YubiKey questions, answeredOver the 10+ years I’ve been at Yubico, I’ve had the pleasure of meeting customers, partners and many others talking about digital security. While every conversation is different, I am often asked many of the same questions about YubiKeys. One thing remains consistent: many people know they need better security, but they’re not sure what […]Read moreFAQYubiKey