multi-factor authentication

  1. Enhancing Cybersecurity: USDA's Phishing-Resistant Multi-Factor Authentication Success

    In an increasingly digital world, where the threats of cybercrime loom larger every day, the need for robust security measures has never been more pressing. On November 20, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) alongside the U.S. Department of Agriculture (USDA)...
  2. Solving YubiKey Login Issues on Windows 11: A User's Guide

    In the ever-evolving world of Windows 11 security, multi-factor authentication (MFA) has become a cornerstone for securing user accounts. One popular solution that has garnered attention is YubiKey, a hardware-based security key designed to enhance log-in security. However, as with any...
  3. Mandatory Multi-Factor Authentication for Microsoft 365: What You Need to Know

    In a move that’s bound to have significant implications for IT professionals and organizations using Microsoft 365, Microsoft has announced that multi-factor authentication (MFA) will become a mandatory requirement for accessing the Microsoft 365 Admin Center starting in February 2025. The shift...
  4. HID and Microsoft Entra ID: Revolutionizing Multi-Factor Authentication with Access Cards

    In a remarkable stride toward enhancing cybersecurity in the workplace, HID has announced its new integration with Microsoft Entra ID. This innovative move enables employees to leverage their existing physical access cards as a method for multi-factor authentication (MFA). This development is...
  5. Microsoft Partners with HID: Simplifying MFA with Physical Access Cards

    In a significant move towards strengthening cybersecurity within enterprises, Microsoft has announced a partnership with HID, a renowned leader in identity solutions. This collaboration aims to simplify the multi-factor authentication (MFA) process, making it easier for enterprise employees to...
  6. Microsoft and HID Global: A New Era of Multi-Factor Authentication

    In a bid to streamline security protocols and enhance user experience, Microsoft has recently teamed up with HID Global to leverage existing physical access cards as a means of multi-factor authentication (MFA). As organizations increasingly adapt to complex cybersecurity environments, this...
  7. Guide to Connecting Your Work or School Account on Windows with Microsoft Entra

    In the ever-evolving landscape of digital work and education, connecting your Windows device to a work or school account has become a fundamental step. Whether you're an employee accessing corporate resources or a student engaging in online learning, understanding how to set up your Microsoft...
  8. HID Global & Microsoft: Enhancing MFA with Existing Physical Access Cards

    In a significant advancement for enterprise security, HID Global and Microsoft have announced a strategic integration that allows organizations to utilize their existing physical access cards for multi-factor authentication (MFA) with Microsoft's Entra ID. This collaboration aims to streamline...
  9. CISA Warns of Iranian Cyber Threats to Critical Infrastructure

    On October 16, 2024, the Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI, NSA, and several international partners, released a critical advisory warning organizations about the cyber threat posed by Iranian cyber actors. Dubbed "Iranian Cyber Actors Brute Force and...
  10. Critical Windows Vulnerability Allows Permanent Downgrades: What You Need to Know

    In recent reports, a security researcher made headlines by uncovering a serious vulnerability that allows attackers to downgrade Windows devices permanently. This discovery raises significant concerns for Windows users, as it highlights the potential for exploitation that could undermine the...
  11. VIDEO AA21-265A: Conti Ransomware

    Original release date: September 22, 2021 Summary Immediate Actions You Can Take Now to Protect Against Conti Ransomware • Use Link Removed. • Segment and segregate networks and functions. • Update your operating system and software. Note: This Alert uses the MITRE Adversarial Tactics...
  12. AA21-243A: Ransomware Awareness for Holidays and Weekends

    Original release date: August 31, 2021 Summary Immediate Actions You Can Take Now to Protect Against Ransomware • Make an offline backup of your data. • Do not click on Link Removed. • If you use RDP, secure and monitor it. • Link Removed your OS and software. • Use Link Removed. • Use Link...
  13. AA21-116A: Russian Foreign Intelligence Service (SVR) Cyber Operations: Trends and Best Practices for Network Defenders

    Original release date: April 26, 2021 Summary The Federal Bureau of Investigation (FBI), Department of Homeland Security (DHS), and Cybersecurity and Infrastructure Security Agency (CISA) assess Russian Foreign Intelligence Service (SVR) cyber actors—also known as Advanced Persistent Threat 29...
  14. AA20-336A: Advanced Persistent Threat Actors Targeting U.S. Think Tanks

    Original release date: December 1, 2020<br/><h3>Summary</h3><p class="tip-intro" style="font-size: 15px;"><em>This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK®) framework. See the <a href="Techniques - Enterprise | MITRE ATT&CK®">ATT&amp;CK for...
  15. AA20-296B: Iranian Advanced Persistent Threat Actors Threaten Election-Related Systems

    Original release date: October 22, 2020 Summary The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are warning that Iranian advanced persistent threat (APT) actors are likely intent on influencing and interfering with the U.S. elections to...
  16. AA20-120A: Microsoft Office 365 Security Recommendations

    Original release date: April 29, 2020 Summary As organizations adapt or change their enterprise collaboration capabilities to meet “telework” requirements, many organizations are migrating to Microsoft Office 365 (O365) and other cloud collaboration services. Due to the speed of these...
  17. TA18-086A: Brute Force Attacks Conducted by Cyber Actors

    Original release date: March 27, 2018 Systems Affected Networked systems Overview According to information derived from FBI investigations, malicious cyber actors are increasingly using a style of brute force attack known as password spraying against organizations in the United States and...
  18. TA15-213A: Recent Email Phishing Campaigns – Mitigation and Response Recommendations

    Original release date: August 01, 2015 Systems Affected Microsoft Windows Systems, Adobe Flash Player, and Linux Overview Between June and July 2015, the United States Computer Emergency Readiness Team (US-CERT) received reports of multiple, ongoing and likely evolving, email-based phishing...
  19. TA13-175A: Risks of Default Passwords on the Internet

    Original release date: April 10, 2013 | Last revised: June 24, 2013 Systems Affected Any system using password authentication accessible from the internet may be affected. Critical infrastructure and other important embedded systems, appliances, and devices are of particular concern...