Cisco Duo Blog
Industry News

Protecting MSPs from helpdesk phishing
MSPs and Help Desks are at risk from helpdesk phishing as fraud attempts become increasingly sophisticated. Verifying identity is vital in preventing an attack.

Don’t get hooked! 5 essential security tips to combat holiday phishing
The holidays are a popular time for phishing attacks, but there are ways that you can protect yourself your organization from these threats.

Defending against help desk attacks
Duo’s identity security solutions can help organizations defend against social engineering attacks against the help desk.

Why cybersecurity strategy must start with identity
Digital transformation makes workforce identity tools the new perimeter. To combat identity threats, organizations must implement an identity security program.

4 key pillars of building an identity security program
The 4 pillars of identity security - Identify, Detect, Protect & Respond - offer a strong foundation for securing digital environments when part of a strategy.

Turning Microsoft MFA requirement for Azure into epic security win with Duo
You can satisfy Microsoft's mandatory MFA requirement for Azure using several Duo configurations, better protecting any Azure resources you're using.

Legacy authentication protocols: Why RADIUS is (still) important
RADIUS is a vital protocol, and can be used when protecting applications with Duo to meet an organization's specific environment and end-user needs.

Best practices for enrolling users in MFA
Enrolling users in MFA is essential for security, but enrollment can be a logistical challenge. We unpack best practices for enrollment in our blog.

A clear and present need: Bolster your identity security with threat detection and response
IT teams need an identity security program built on a strong foundation with the right tools. Learn how to design a program, and how to implement ITDR.

What are passkeys
Want to learn more about how passkeys provide secure access to protected resources? Learn how passkeys work and how they fit into a passwordless ecosystem.