New to cybersecurity
Are you new to cybersecurity? There can be a lot of technical terms to understand, and this article can help point you in the right direction. If you haven’t already, refer to this page. It covers the basics on what a YubiKey is, why to use it, and how it works.
Passwords are highly vulnerable as they are easy to create and steal. Stolen credentials allow malicious actors to impersonate a compromised user, but can also be used to gain additional credentials and information. The bar is simply too low with passwords. Even legacy MFA methods, such as SMS or mobile authentication, have been proven to be highly vulnerable to phishing. Phishing-resistant MFA based on FIDO/WebAuthn authentication protocols, such as the YubiKey, is the modern and effective approach to keeping your hard work, brand image, and business protected.
Resources
To learn more about what security protocols are, technical terms, and modern authentication, refer to the resources linked below.
-
Cybersecurity glossary - Security industry keywords, acronyms and technical terms
-
Authentication standards - More information on authentication standards and 2FA/MFA
-
Support FAQ - General questions answered
- What is a security protocol? - Security protocols explained