Blog

Secure your Google Account with YubiKey

 

When it comes to email accounts, strong security should be the top priority, especially in today’s environment where hackers and malware attacks are predominant. Traditional or basic login is simply not enough to ensure that accounts are secured. For this reason, the use of a security key is recommended for added protection.

 

A security key is a device that provides high-level authentication services to prevent cyberattacks like account phishing. Enter the YubiKey, a hardware security key that delivers strong two-factor, multi-factor and passwordless authentication and is compatible with Google accounts.

 

To ensure complete protection for Google accounts, the following YubiKey products are recommended:

 

  • YubiKey 5 Series - a multi-protocol physical security key that delivers a strong defense against phishing and account takeovers with two-factor and multifactor authentication. It is suitable for all web services with its rich features and support services like the FIDO2, U2F and smartcard to secure accounts on all devices. USB-A, USB-C, Lightning and nano form factors are available.

 

  • YubiKey Bio Series - a link-up of Yubico’s hallmark security and increased user convenience through passwordless biometrics authentication. It is a single hardware key that provides impeccable login methods, including biometrics and PIN-based authentication supported by FIDO2/WebAuthn.

 

  • YubiKey FIPS Series - an FIPS 140-2 validated security key that blocks unauthorized access and allows government agencies and other regulated industries to meet the NIST’s Authenticator Assurance Level 3 (AAL3). This series offers 6 different compatibilities, including USB-A, USB-C, NFC and Lightning.

 

  • YubiKey Sky Series - an all-in-one security key that ensures innovative and flexible authentication and secures hundreds of online services like Google accounts with FIDO support.

 

Requirements

Setting up YubiKey to protect Google accounts from account takeovers is quick and convenient. Here are the requirements for setup:

  • Browser that natively supports U2F (Google Chrome, Opera, Firefox)

  • A Google account (Gmail, Google Docs, YouTube, Blogger, Google Ads)

 

For managed Google accounts, the administrator should enable two-step verification before using

YubiKey. If two-step verification is not available, contact the administrator for a security option.

 

How to Set Up YubiKey on Your Google Account

1. Turn on 2-step verification (proceed to the next step if already set up).

2. Add a security key, preferably add two YubiKeys or security keys where it can be interchangeable

or set up both as either a primary or a backup device.

3. Print out and/or save backup codes as reference once you have logged in without your YubiKey. Scroll

down once YubiKey(s) was added and click Show Codes, then click Download or Print and save

the codes.

4. Set up Google Authenticator as an alternative to generate verification codes if you don’t have

your YubiKey as they can still receive codes even if not connected to the Internet.

 

Your YubiKey is now registered to your account as your default two-step authentication. You have access to add another or remove a security key and see all devices that are registered in the account.

If you lose your YubiKey, remove it from your account at https://myaccount.google.com/security. Your account is highly secured as unauthorized users will still need your username and password to access the email.

 

Login to your Google Account

You can easily log in to your Google account using YubiKey with these simple steps:

 

1. Insert your YubiKey once you need to login to your Google account.

2. Enter your username and password.

3. Click the YubiKey once it begins to blink.

 

You can check the box to “Remember this computer for 30 days” if you want easy login without repeatedly inserting your YubiKey account. Click Use a verification or Authenticator app if you don’t have your YubiKey.

 

Yubico is a worldwide authentication leader that delivers straightforward and effective secure access to

computers, servers and Internet accounts. Yubico’s security key, YubiKey, is the industry’s pioneer in

delivering high level authentication standards with its two-factor, multi-factor and passwordless

authentication features.

 

The company also provides authentication protocols including Yubico U2F

security key. Yubico offers premium and efficient range of YubiKey security key NFC and Bio products

such as, YubiKey 5 NFC, YubiKey 5C NFC, YubiKey 5Ci, YubiKey 5 Nano and YubiKey Bio. To learn

more about other Yubico products, call +63 2 8858 5555

 

 

What is Account Takeover Fraud and How to Prevent it?

What is Account Takeover Fraud and How to Prevent it?

What is account takeover fraud?

Account takeover fraud, or in short ATO, happens when a cybercriminal gains unauthorized access to someone’s account. Hackers usually do this for fraudulent purposes such as stealing money, making purchases, or stealing information to sell or access other accounts. Attackers commit fraud using various schemes such as phishing, malware, spyware, to name a few.

To stop account takeovers, make sure to have strong cybersecurity at hand. Two-factor authentication or multi-factor authentication, for instance, provides strong and formidable security solutions to help eliminate fraudsters and account takeovers.

How does an account takeover occur?

In an attempt to illegally take over an account, cybercriminals use several techniques. These include:

  • Phishing - This fraudulent practice involves sending an email that appears to come from a reputable source to trick victims into revealing sensitive information or installing malware. Aside from email, some criminals use text messages or social media messaging services to deceive victims.
  • Credential Stuffing - Using the same password on multiple (or sometimes all) accounts is a bad practice. In this cyberattack, a series of stolen login credentials from one entity is used to attempt to access other accounts or services.
  • SIM Card Swapping- This scam aims to take control of a user’s digital accounts linked to a SIM. It uses the vulnerability of the two-step verification, wherein the second step is an SMS or call.
  • Malware- Malware is an umbrella term for all the types of malicious software created to harm or exploit any programmable device, service, or network. This usually aims to extract data for financial gains.
  • Mobile Banking Trojans- This technique steals money from a user’s mobile bank account after stealing the victim's authentication credentials by using a fake screen on top of a legitimate bank application.
  • Man-in-the-Middle Attacks- This is an eavesdropping attack where the fraudster gets in the middle of an existing conversation or data transfer to acquire personal information such as login credentials, bank details, or credit card numbers.

Protection and prevention against account takeover fraud

How to detect account takeover fraud?

To detect account takeover attempts, there are some crucial signs you can look out for, as follows:

  • Use of various country IP addresses- One indicator of an account takeover is a quick rise of IP addresses from one or many unusual countries. This is more likely to happen if the fraudster doesn’t know the legitimate account owner’s original location.
  • Changing different accounts with shared details- If you notice different accounts making comparable or similar changes to a shared detail, you may be under an account takeover attack.
  • Unknown devices- As preparators usually hide the device they use, detecting unknown devices attempting to access multiple accounts is a clear sign of an account takeover in action.
  • Multiple accounts accessed by the same device - Some fraudsters may not try to hide or spoof their devices. If you’re spotting more than one of your accounts linked to one device, it may be a manifestation of an account takeover.

How to Prevent Account Takeover Fraud?

Here's a list of cybersecurity you can use to prevent account takeover fraud:

  • Tracking system - Sandboxing, or a method of creating an isolated test environment, can help monitor all activities related to an account.
  • Web application firewall - Web Application Firewall (WAF) can help identify and block account takeover attacks through targeted policies.
  • AI-based detection - With AI-based security, even sophisticated account takeover attempts can be easily resolved while effectively monitoring a website for any unusual activities.
  • Multi-Factor Authentication - Deploying multi-factor authentication is the key to preventing or stopping account takeovers. Attackers will never access an account without the authentication sent only to the legitimate users.

Modern and secure authentication solution against account takeovers

Designed for optimum security, Yubikey holds the authentication standards for the modern web.

  • What is Yubikey?

    Yubikey is the leading security key and the only authentication technology proven to stop account takeovers at scale. It works with hundreds of services with an all-in-one configurable security key for high-quality protection.
  • How will Yubikey stop account takeovers? Yubikey enables strong two-factor, multi-factor, and passwordless authentication that prevents hackers and account takeovers from having successful attempts and attacks.

With the highest level of security and privacy, Yubikey solutions are your one key to multiple security needs. Yubico security keys include powerful security tools such as Yubico U2F Security Key, YubiKey 5 NFC, YubiKey 5Ci, Yubico Security Key NFC, YubiKey 5C NFC, YubiKey 5 Nano, and YubiKey Bio.

Want to avail Yubico products? Contact +63 2 8858 5555 today!

Secure Your Cryptocurrency Accounts with YubiKey

picture 1



Cryptocurrency is a hot trend in the world of investment nowadays. Described as a transformative technology, cryptocurrency is a digital currency that could revolutionize a series of industries. These virtual tokens exist in a distributed and decentralized ledger known as blockchain technology. It's an online asset that users can use to invest and create purchases online.

However, cyberattacks are becoming more and more prevalent these days, and securing your crypto assets can be tough. Fortunately, hardware security keys can help safeguard your digital investments and web transactions.

How to protect your crypto account?

With a physical security key such as YubiKey, you can intensify your cryptocurrency protection to secure your online accounts and important transactions with ease. YubiKey is one of the most reliable ways to protect logins, trades, and transfers at the exchange level, which helps for cryptocurrency adoption advancements.

How does YubiKey help exchanges and users?

As a trusted security key, YubiKey provides optimum protection for your cryptocurrency assets and their dealings over the web.

YubiKey for exchanges
For strong authentication in account exchange, YubiKey ensures that cryptocurrency is protected at the exchange level and that the account information remains safe on the key. USB security key lets you store cryptocurrency private keys securely on hardware, defend your asset against remote attacks, and prevent remote extraction.

With YubiKey, the authentication to exchange accounts is easy. The users simply need to tap or touch their security key. Also, a mobile authenticator by Yubico allows private data to be securely stored on the YubiKey against the mobile device.

YubiKey for accounts
YubiKey, and its USB C security keys, gives online accounts formidable protection against unauthorized access. Users can opt for
multi-factor authentication (MFA) that includes a biometric security key allowing only legitimate users to access digital accounts and critical systems.

Which YubiKey is right for you?

  • YubiKey 5 NFC - Holding multiprotocol support on a single key, YubiKey 5C NFC delivers superior defense against account takeovers and other forms of cyberattacks. This hardware-based solution features fast and easy authentication, which only needs single touch or tap to an NFC-enabled device. It is highly accessible since no batteries or network connectivity is required for it to work.
  • YubiKey 5C NFC - This Yubico security key makes it impossible for hackers to gain access or steal your valuable files, accounts, and financial information. YubiKey 5C NFC lets you set a two-factor authentication, which is a convenient and proven way to keep your digital world safe.
  • YubiKey 5Ci - YubiKey 5Ci has the entire benefits of a YubiKey with a dual connector that supports both USB-C and Lightning. It enables secure online and mobile app logins across all major operating systems, including iOS.

  • YubiKey 5 Nano - Protect your crypto asset with YubiKey 5 Nano, the world's most protective security key that works with a range of applications and services like no other. It combines hardware-based authentication and public key cryptography to eliminate account takeovers.


Poor security has been a serious threat to cryptocurrency investments. Make sure your digital world security is never compromised. Protecting your online assets with YubiKey hardware security keys delivers superior defense against hackers and account takeovers online.

Want to take your cryptocurrency protection to the next level? YubiKey by Yubico is a proven technology that stops account takeovers at scale. Other Yubico powerful products include Yubico Security Key NFC and YubiKey Bio.

For inquiries, email us at sales@wsiphil.com.ph or call us at +63 2 8858 5555 today!

Why Do You Need Yubikey As Your Primary Authenticator?

primary authenticator

What is Yubikey?
YubiKey is the industry's top security key, allowing users to deploy a formidable two-factor, multi-factor, and passwordless authentication. Its unparalleled, but easy-to-use security, contains multiple functions for protected logins, online browsing, apps, computers, and even physical spaces.

A hardware security key, YubiKey requires no software installation or battery life to work. All it takes to enable its power is to plug it simply into a USB port and touch the button. Or tap-and-go using the NFC contactless technology.

Yubikey Vs. Other Authenticators
YubiKey is your one key for several applications, while others are:

  • On-Device Prompt - Phone prompts, or on-device prompts, is a 2-step verification (2SV) method that requires the user to follow provided phone prompts to verify a certain login attempt, increasing security levels.
  • Secondary Email - Setting up a secondary email address can further protect your primary account in case its security is ever compromised. Secondary emails can receive security notifications such as password recovery. It's good to ensure that your recovery address is accessible and safe.
  • SMS Code - Also known as SMS-based two-factor authentication (2FA) and SMS one-time password (OTP), an SMS code is a verification code sent via text message to verify the user's identity. It is like a secondary verifier for a more secure access gain to a network, account, or application.
  • Phone Number - Phone number authentication is a security method where the sender sends an SMS message to the receiver's phone. The receiver then logs the provided one-time code. This helps users to easily verify their identities remotely and when they are online.

With YubiKey, on the other hand, you can strongly safeguard your online and electronic assets within a simple touch. Since it is a physical security key, there's no need for you to use your smartphones, or re-type your passcodes. Simply plug in the USB security key and then tap the button, and the rest is done for you. Plus, it works with a range of services including, Windows and Mac login, Gmail, Dropbox, Facebook, and other several services.

Which Yubikey is right for you?

  • Yubikey 5 NFC - This Yubico's U2F security key is the most effective approach to reject account takeovers. Aside from efficiency, YubiKey 5 NFC offers an intuitive user experience and quick setup, deployment, and use. This Yubico NFC security key supports FIDO2, U2F, Smart card, OpenPGP, and OTP.
  • Yubikey 5C NFC - YubiKey 5C NFC is a USB C security key that also supports NFC, so you can just tap and go. It is FIDO certified and can work with Google Chrome and any FIDO-compliant application on Mac OS, Windows, or Linux.
  • Yubikey 5Ci - This Yubico security key is the industry's first dual connector, supporting both USB-C and Lightning. YubiKey 5Ci authenticates 4X faster than other methods. It is a unified secure authentication solution for modern devices supporting USB-C and Apple devices.
  • Yubikey 5 Nano - This tiny but tough hardware security key provides superior defense against hackers,phishing, and other cyberattacks. Its authentication methods include passwordless, 2FA, and MFA or multi-factor authentication.
  • Yubikey 5C - Yubikey 5C is a 2FA USB security key that suits USB- C ports. It features an easy and fast authentication solution with a single touch. Also, it is built on high-performance and secure elements, offering optimum security and a great user experience.

Cybercriminals are getting more and more sophisticated each day, making digital security extra significant these days. Make sure to keep protecting your online world with high-quality security solutions like YubiKey to eliminate cyber security threats and attacks such as identity theft, phishing, and fraud.

Yubico is a powerful yet simple solution to digital security needs. It is your all-in-one configurable security key that works with an array of services with convenience, reliability, and affordability. Its other product includes YubiKey Bio for a premium standard biometric security key.

For more inquiries, feel free to call us at +63 2 8858 5555 today!

Blog Test 1

Blog test only Overview

parallels-simplifies-virtual-app-delivery

parallels-remote-application-server

parallels-reinventing-business-works

parallels-fluidstream-case-study

Test