
Business Intelligence Data
4 months ago
Organizations should consider the use of phishing resistant authenticators such as PIV cards, FIDO authenticators, and the Web Authentication API to protect their sensitive data from criminals using malicious phishing attacks. These tools employ public-key cryptography or biometric/PIN unlocks so no user entered information is exchanged over the internet and are necessary in order to fully secure systems against all attack vectors. Individuals can also enable these features on their own accounts by exploring security settings of online applications they use.