Eliminating enterprise risk: One phishing-resistant user at a time (2024)

Passwords are ingrained in enterprises with traditional identity lifecycle stages, which exposes them to increasingly sophisticated cyber attacks that rely on stolen login credentials for success like phishing. Phishing is one of the greatest cybersecurity risks that enterprises face – in fact, stolen passwords are one of the largest threat vectors compromising online security today with over 80% of all security breaches resulting from stolen login credentials. Further driven by an uptick in the use of AI-driven cyber attacks, enterprises are facing persistent threats from phishing attacks which specifically target the registration, authentication, and recovery processes of employees.

Despite organizations aiming to improve their cyber defense by implementing multi-factor authentication (MFA), phishing remains a significant challenge – requiring a more proactive cybersecurity approach. While any form of MFA is better than a password, not all forms of MFA are created equal. Legacy MFA approaches, such as SMS and mobile authenticator apps, are broken and have been proven repeatedly to be easily bypassed by malicious actors and also causes user MFA fatigue due to the recurring instances of the user having to make authentication decisions and typing in ever changing codes.

Phishing-resistant MFA is the latest authentication method that many organizations are looking to implement because it is proven to prevent phishing attacks every time and also reduces the burden on users to make the right choices and not hand over their credentials during a phishing attempt. In fact, important government mandates have come in place for government agencies and private sector organizations to harden cybersecurity with phishing-resistant MFA. Phishing-resistant MFA solutions like the YubiKey mitigate attackers intercepting or tricking users into revealing access information by requiring each party provide evidence of their identity, as well as communicate their intention to initiate authentication via deliberate action.

The prevalence of phishing attacks in the enterprise via tactics like social engineering calls to the helpdesk (among many other methods) can not only hijack the user registration process, but also ongoing authentication and account recovery processes in the event of a lost or stolen device. With recent advancements in passwordless – and new on-device authentication solutions – the way an organization can establish and manage a user’s identity credential throughout its lifecycle has evolved to address these increasing challenges. In order to truly prevent phishing attacks, organizations must do more than just invest in phishing-resistant authentication – they must instead focus on developing phishing-resistant users.

What delivering phishing-resistant users looks like in practice

Phishing-resistant users is not just a reactive measure, but a proactive enterprise strategy aimed at removing the risk of phishing by eliminating all phishable events from the entire user lifecycle. The primary security control for enterprises has traditionally been to prevent phishing at the time of authentication. However, as enterprises are now rolling out phishing-resistant authentication, user accounts have entered a hybrid state with both phishable and phishing-resistant credential types available.

This requires enterprises to elevate the processes for issuing credentials, registering devices, and signing into passkey providers to meet the same bar as the authentication controls that have been in place. For point-in-time authentication policies to be effective, enterprises must ensure that the users have the right type of authenticators, credentials, and processes for every stage of the account lifecycle.

Given that users often move across platforms (i.e. Apple, Google, Microsoft), devices (smartphones, laptops, tablets) and between personal and corporate apps and services in the course of their day, many conventional authentication techniques are inherently phishable. And organizations often temporarily default to phishable user registration, and account recovery methods when a user is first being on-boarded or when their device is lost or stolen, creating convenient points in time for a phishing attack to take hold. This piecemeal approach to authentication exacerbates the challenge for enterprises in consistently safeguarding their systems and data, and even staying in compliance.

Traditional security measures like phishable MFA (i.e. SMS, push notifications and one-time passcodes) and heavy reliance on user education are insufficient against sophisticated phishing tactics, highlighting the need for stronger defenses and a new mindset and approach around building a phishing-resistant enterprise. This is why enterprises need to instead think of equipping their users with the type of authentication that offers phishing-resistance no matter which business scenario they are engaged in or platforms or devices they are using.

The only effective approach to removing phishing from an organization’s threat landscape is to ensure that every user and process within the organization becomes phishing-resistant. Secure authentication that moves with users across all devices, platforms, and services no matter how they work is not a luxury, but a necessity in today’s fast-moving digital landscape. Phishing-resistance in registration, authentication, and recovery processes are mandatory for cultivating phishing-resistant users, and it all starts and ends with deploying the highest-assurance modern hardware security keys: YubiKeys.

To create phishing-resistant enterprises, organizations must develop phishing-resistant users by implementing the following across all users:

  1. To achieve maximum security, equip all users with phishing-resistant MFA and deploy purpose-built and portable hardware security keys as the primary authenticator.
  2. Establish phishing-resistant account registration and user recovery procedures for all, utilizing purpose-built and portable hardware security keys as the foundation for the highest-assurance security.
  3. Employ technology-driven solutions that minimize the reliance on user education, while also providing essential education on the principles and benefits of phishing-resistant MFA for both corporate and personal use.

By fostering phishing-resistant users, built on the foundation of the highest-assurance hardware security keys for all users across the entire organization, enterprises enhance cybersecurity resilience, minimize reliance on reactive measures, and effectively safeguard sensitive data and operations. The cornerstone of building such resilience lies in fostering a culture of phishing-resistant users, with YubiKeys as the essential starting and ending point.

Stay tuned for our next blog post which will detail how organizations can deploy phishing-resistant user strategies effectively. Check out our recent on-demand webinar to learn more about navigating passkeys to passwordless security at scale and user lifecycle considerations for achieving a successful passwordless rollout at scale.

Eliminating enterprise risk: One phishing-resistant user at a time (2024)
Top Articles
Platinum group metals
Three Timeless Investment Lessons From Warren Buffett’s Annual Letter
Printable Whoville Houses Clipart
Riverrun Rv Park Middletown Photos
Tmf Saul's Investing Discussions
Loves Employee Pay Stub
Obor Guide Osrs
The Daily News Leader from Staunton, Virginia
Northern Whooping Crane Festival highlights conservation and collaboration in Fort Smith, N.W.T. | CBC News
Tap Tap Run Coupon Codes
Osrs But Damage
Elden Ring Dex/Int Build
Draconic Treatise On Mining
Visustella Battle Core
Progressbook Brunswick
Premier Boating Center Conroe
Red Heeler Dog Breed Info, Pictures, Facts, Puppy Price & FAQs
Helloid Worthington Login
What Is A Good Estimate For 380 Of 60
Trini Sandwich Crossword Clue
Cooktopcove Com
Shannon Dacombe
London Ups Store
Uky Linkblue Login
Chelactiv Max Cream
DBZ Dokkan Battle Full-Power Tier List [All Cards Ranked]
Keck Healthstream
Craigslist Clinton Ar
Wemod Vampire Survivors
Drug Test 35765N
Www.patientnotebook/Atic
Encyclopaedia Metallum - WikiMili, The Best Wikipedia Reader
Bidevv Evansville In Online Liquid
Parkeren Emmen | Reserveren vanaf €9,25 per dag | Q-Park
1979 Ford F350 For Sale Craigslist
Downtown Dispensary Promo Code
WPoS's Content - Page 34
Our 10 Best Selfcleaningcatlitterbox in the US - September 2024
Gncc Live Timing And Scoring
Best Restaurants In Blacksburg
Ludvigsen Mortuary Fremont Nebraska
Mixer grinder buying guide: Everything you need to know before choosing between a traditional and bullet mixer grinder
Bianca Belair: Age, Husband, Height & More To Know
Fwpd Activity Log
All Obituaries | Sneath Strilchuk Funeral Services | Funeral Home Roblin Dauphin Ste Rose McCreary MB
Locate phone number
Charli D'amelio Bj
Peace Sign Drawing Reference
Love Words Starting with P (With Definition)
Gon Deer Forum
The Average Amount of Calories in a Poke Bowl | Grubby's Poke
Sherwin Source Intranet
Latest Posts
Article information

Author: Arielle Torp

Last Updated:

Views: 5857

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Arielle Torp

Birthday: 1997-09-20

Address: 87313 Erdman Vista, North Dustinborough, WA 37563

Phone: +97216742823598

Job: Central Technology Officer

Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming

Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you.