
Want to stop hackers from using phishing as leverage to get into your IT environment? Start using phishing-resistant multifactor authenticators such as hardware keys and identity verification cards. That’s the advice of the U.S. National Institute for Standards in Technology (NIST). “Not every transaction requires phishing resistant-authenticators,” the agency said in a blog last week…
Read More