Security Market Segment LS
Thursday, 12 May 2022 23:49

Yubico releases MFA guide to demystify a phishing-resistant passwordless future


Yubico, of YubiKey fame, has issued a multi-factor authentication (MFA) guide to help better define common and new industry terms, as well as the standards that are supporting modern authentication. If you’re not using MFA to protect your online identity then you really must, and Yubico’s guide can help you see what it is all about. 

Yubico is working towards a phishing-resistant and passwordless future and says the first step in achieving this is understanding the security industry’s “alphabet soup” of acronyms and tools - of which the world of MFA is no exception. Faced with increasingly complex and evolving cyberattacks, the need for the adoption of modern authentication is now being highlighted at a global scale - as seen in the White House's cybersecurity executive order and Office of Management and Budget memo outlining the critical need for phishing-resistant MFA.

“It’s becoming increasingly difficult for people and businesses alike to keep up with the constantly changing cybersecurity landscape,” said Yubico chief marketing officer Ronnie Manning. “Our goal at Yubico is to make the internet safer for everyone, including making industry terms more accessible and easier to understand.”

Yubico’s MFA guide is designed to eliminate confusion and help individuals and organisations understand different authentication options and how these options can work for them. Learn about two-factor authentication, multi-factor authentication, passwordless logins, FIDO-based authentication, and much more. Furthermore, it is clear that not all authentication is created equal. The guide will help explain the difference between basic authentication and modern, phishing-resistant MFA, an authentication process that is immune to attackers intercepting or even tricking users into revealing access information.

“Everyone should take this opportunity to protect their identities, data, and accounts by going beyond using basic username and passwords and turning on MFA for their online applications and services, including the use of modern authentication tools like YubiKeys,” said Manning.

To learn more about the types of MFA and what one will protect you the most, see the Yubico MFA guide here

Read 914 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


David M Williams

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News