Resource Category: White papers and reports

  • woman working at computerBest practices for securing mobile-restricted environmentsLearn security best practices to secure mobile-restricted environments where users can’t, won’t, or don’t use a mobile phone, and therefore weak forms of protection such as mobile authentication is simply not even an option.Read more
  • Why legacy authentication is putting your users at riskStep one in any effective cyber security program includes securing privileged accounts, credentials, and secrets with modern strong authentication. Download the Yubico White Paper, The critical strong authentication need for privileged users, to learn who really is a privileged user, and industry best practices to secure your privileged users against phishing attacks and account takeovers.Read moreauthenticationprivileged users
  • shared workstations featured imageSecuring shared workstations against modern cyber threatsDownload the Yubico White Paper, to learn the key considerations for authentication across shared workstation environments such as call centers, manufacturing floors, retail and hospitality kiosks, medical stations, and others. Read morephishingphishing-resistant MFAshared workstation
  • How State and Local Governments Combat Account TakeoversRead how state and local governments are securing workers, election infrastructure, and digital services using the YubiKey for strong authenticationRead moregovernmentstate and local governmentstrong authentication
  • woman working from homeModern strong authentication for online banking | YubicoLearn how modern and secure authentication using FIDO open standards used by banks such as Morgan Stanley, Vanguard, and Bank of America, can drive competitive differentiation in the financial sector.Read morebankingfinancial servicesstrong authentication
  • mobile white paper cover with phoneThe top 5 mobile authentication misconceptions – YubicoDownload the Yubico White Paper, The top 5 mobile authentication misconceptions to learn the key misconceptions related to mobile-based MFA that are a ticking time bomb, and putting organizations at risk.Read moreMFAmobile authentication
  • ransomware white paper cover with lockCombat Ransomware: Strong authentication best practicesOrganizations are increasingly becoming victims of ransomware attacks. And this had long been foreshadowed with experts having estimated earlier that a ransomware attack will occur every 11 seconds in 2021*. When it comes to ransomware it’s not a question of if your organization will be targeted, but when. Ransomware and its connection to strong authentication […]Read moreransomwarestrong authentication
  • phishing ebook cover with phoneWhy mobile authentication just isn’t good enough – YubicoLearn best practices to protect against enterprise-wide identity phishing and why mobile authentication just isn’t good enough.Read moreenterprise securityphishing-resistant MFAstrong authentication
  • Biometric authentication best practicesLearn about biometric authentication approaches today, the gaps and the way to adopt biometric authentication best practicesRead morebiometricsYubiKey Bio
  • authentication and compliance healthcare organizations featured imagePhishing-resistant authentication and compliance for healthcare organizations: How the YubiKey helps Healthcare Organizations meet regulatory requirementsRead the white paper to learn how the YubiKey helps healthcare organizations ensure strong authentication and regulatory complianceRead morecompliancehealthcarestrong authentication