BEST PRACTICES GUIDE
How to get started with
phishing-resistant MFA
to secure federal government
Six deployment best practices to accelerate adoption at scale
Congratulations on taking the first step to a more robust security posture by considering phishing-resistant hardware security keys to secure non PIV/CAC eligible users and use cases with phishing-resistant multi-factor authentication (MFA). While YubiKeys are simple to deploy and use, a successful YubiKey deployment from start to finish includes essential elements that our experts recommend.
Download the Yubico Best Practices Guide, How to get started with phishing-resistant MFA to secure federal government to learn the six deployment best practices that can help your agency accelerate adoption of modern, phishing-resistant MFA at scale using the YubiKey.
![Federal best practices guide preview](https://www.yubico.com/wp-content/uploads/2023/07/Image-Landing-Best-Practices-Fed-Govt-527-x-392@2x-1024x762.png)