

Hardware authentication tokens are far more secure than other MFA methods like SMS messages or knowledge-based security questions. For business use cases where highly sensitive data such as electronic health records (EHR) or personally identifiable information (PII) are concerned, the improved security of a hardware token such as a YubiKey is highly desirable. Multifactor authentication (MFA) is critical for reducing opportunities for threat actors to breach accounts.

It leverages your web browser to verify if you are logging into the intended domain and rejects the authentication if it detects that the credentials are being used on an unintended site.Īuthentication devices that meet the FIDO U2F standard protect your accounts against phishing, session hijacking, man in the middle, and malware attacks.īack to Table of Contents Why Should I Use a YubiKey?

Universal 2nd Factor (FIDO U2F) is a form of asymmetric cryptographic authentication that is compatible with security keys. The requirement to shift authentication to include something the user has (vs simply something they know, such as a password or knowledge-based question) mitigates the risks associated with compromised credentials as the account remains inaccessible without the physical device.” – Paul Stamatiou “The core of U2F leverages public-key cryptography with the use of a hardware key that contains a secret and unique key that is built directly into the device. Requiring physical access to a piece of hardware prevents attackers from remotely infiltrating accounts as they will need more than simply a username and password to gain access. While MFA can be accomplished with other forms of authentication such as a One Time Password (OTP), FIDO-compliant tokens such as YubiKeys provide an added layer of security by requiring a user to have access to a unique physical device to authenticate. YubiKeys and other hardware tokens are used to secure accounts with multifactor authentication (MFA). YubiKeys are hardware-based U2F security keys that are manufactured by Yubico.
