The right hardware for your business, sourced and supplied by a team that understands what you actually need.
Quality business computers at a fraction of the cost — professionally refurbished, thoroughly tested, and ready to work.
The gold standard in hardware authentication — simple to use, impossible to phish, and trusted by organisations that take security seriously.
The right software for your business, sourced and supplied by a team that understands what you actually need — without the subscription.
Passwords and authenticator apps have their limitations. Passwords get stolen, guessed, or reused. Authenticator app codes can be intercepted through sophisticated phishing attacks that have become increasingly common and convincing. For businesses that need to be certain their accounts are protected against unauthorised access — regardless of what an attacker might try — hardware security keys are the most reliable answer available.
YubiKeys are physical authentication devices made by Yubico, widely regarded as the most trusted name in hardware security keys. They provide a fast, simple, and extraordinarily secure method of verifying identity — a touch of a key is all that's required, and unlike passwords or codes, a YubiKey cannot be phished, cloned, or intercepted remotely. It either exists in the physical world or it doesn't.
We Do Your IT Supplies stocks and supplies a range of YubiKey models to suit different businesses, budgets, and use cases. Our team can help you identify the right model for your needs and ensure you're set up correctly from the start.
A YubiKey is a small, durable hardware security key manufactured by Yubico. It plugs into a USB port — or connects via NFC on compatible devices — and provides a physical second factor for authentication. When logging into a supported account or system, the user simply touches the YubiKey to confirm their identity. No codes to type, no app to open, no waiting.
Unlike software-based multi-factor authentication methods, a YubiKey generates a unique cryptographic response for every authentication request. This response is tied to the specific service being accessed, which means it cannot be intercepted and replayed by an attacker — even if someone is tricked into visiting a convincing fake website, the YubiKey will simply refuse to authenticate because the domain doesn't match. This property, known as phishing resistance, is what makes YubiKeys fundamentally more secure than any code-based 2FA method.
YubiKeys support a wide range of authentication protocols including FIDO2, WebAuthn, U2F, OTP, Smart Card (PIV), and OpenPGP, making them compatible with thousands of services and applications — from Microsoft 365 and Google Workspace to password managers, VPNs, and enterprise systems.
The range includes several product lines to suit different requirements, from the versatile YubiKey 5 Series for broad compatibility, to the YubiKey Bio Series for biometric authentication, to the YubiHSM 2 for server-side cryptographic key protection.
Multi-factor authentication is now widely recommended — and in many cases required — as a baseline security control. But not all MFA is equal. SMS codes can be intercepted. Authenticator app codes can be harvested through real-time phishing attacks that proxy the login session. These attacks are no longer theoretical — they're increasingly common and increasingly convincing.
A YubiKey eliminates this class of attack entirely. Because authentication is tied to the physical key and the cryptographic challenge from the legitimate service, there is nothing for an attacker to intercept or replay. Even a highly convincing phishing site cannot extract a valid authentication response from a YubiKey. This is why organisations with the highest security requirements — government agencies, financial institutions, and major technology companies — rely on hardware security keys as their authentication standard.
For businesses of any size, YubiKeys are the right choice when account security genuinely matters — whether that's protecting access to financial systems, client data, cloud infrastructure, or any other sensitive environment. They're also increasingly relevant for Cyber Essentials certification and compliance with data protection obligations, where demonstrating strong access controls is an expectation.
They're also, in practice, faster and easier to use than typing in a six-digit code. Once users have experienced the simplicity of a tap-to-authenticate workflow, the adoption barrier tends to disappear quickly.
YubiKey 5 Series — the most versatile and widely used YubiKey range, supporting FIDO2, WebAuthn, U2F, OTP, Smart Card (PIV), and OpenPGP across a single device. Available in multiple form factors including USB-A, USB-C, NFC, and Lightning variants, making it compatible with virtually any device or service. The YubiKey 5 Series is the most popular choice for business deployments and everyday use.
YubiKey 5 Series FIPS — the FIPS-validated version of the YubiKey 5 Series, certified to meet US Federal Information Processing Standards. Designed for organisations with the most stringent compliance requirements, including government and regulated industries where FIPS 140-2 validation is mandated.
YubiKey Bio Series — FIDO Edition — combines hardware security key authentication with on-device fingerprint biometrics, allowing users to authenticate with a touch that verifies both possession of the key and their identity. Provides an exceptionally high standard of authentication without requiring a PIN, making it particularly well suited to environments where biometric verification is preferred.
YubiKey Security Keys — a more focused range supporting U2F and FIDO2 protocols, designed for businesses that need strong phishing-resistant two-factor authentication without the broader multi-protocol capabilities of the YubiKey 5 Series. A cost-effective option where FIDO2/U2F is the primary requirement.
YubiHSM 2 — a compact hardware security module designed to protect cryptographic keys on servers and in cloud environments. Rather than endpoint authentication, the YubiHSM 2 is focused on securing the keys that protect your infrastructure — preventing key extraction and providing a hardware root of trust for server-side cryptographic operations.
Reconditioned YubiKeys — thoroughly tested and refurbished YubiKeys that offer the same security capabilities as new devices at a reduced cost. All reconditioned keys support the same protocols and features as their new equivalents, making them an excellent option for budget-conscious deployments where full YubiKey security is required.
Phishing-resistant authentication that software MFA cannot match — the fundamental advantage of a YubiKey over any code-based authentication method is that it cannot be phished. The cryptographic response it generates is tied to the legitimate service's domain, making it useless to an attacker even if they've successfully deceived a user into visiting a fake login page. This protection cannot be replicated by SMS codes or authenticator apps.
Dramatically reduces the risk of account takeover — account takeover is one of the most common and damaging types of security incident businesses face. YubiKeys remove the most common vectors for account compromise — stolen passwords, intercepted codes, and phishing — making account takeover attacks against protected accounts extremely difficult.
Faster and simpler than typing codes — once deployed, authenticating with a YubiKey takes a fraction of a second and requires nothing more than a touch. Users consistently find it faster and less frustrating than opening an authenticator app and typing a six-digit code under time pressure, which improves adoption and reduces workarounds.
Works across thousands of services and applications — with support for FIDO2, WebAuthn, U2F, OTP, Smart Card, and OpenPGP, YubiKeys are compatible with an exceptionally wide range of platforms — including Microsoft 365, Google Workspace, Salesforce, GitHub, AWS, Azure, and most enterprise identity providers.
Supports passwordless authentication — YubiKeys supporting FIDO2 can be used for fully passwordless authentication on compatible services, eliminating the password entirely and reducing the attack surface further. This is increasingly supported by major platforms and represents the direction of travel for enterprise authentication.
Durable, reliable, and requires no battery or connectivity — YubiKeys are solid-state devices with no moving parts, no battery, and no need for a network connection or cellular signal to function. They're built to last and work reliably in any environment, including when a phone has no signal or a battery has died.
Demonstrates strong access controls for compliance — for businesses working towards Cyber Essentials, handling regulated data, or subject to client security requirements, deploying hardware security keys provides a clear and credible demonstration of strong authentication controls.
Expert advice on the right model for your needs — with multiple product lines and form factors available, choosing the right YubiKey for your environment isn't always obvious. Our team can help you identify the right model, quantity, and deployment approach for your specific situation.
Step 1
Step 2
Step 3
Step 4
Step 5
A YubiKey is a physical hardware security key that you plug into a USB port or tap against an NFC-enabled device to authenticate your identity. When you log in to a supported service, the YubiKey generates a unique cryptographic response that verifies you are in possession of the physical key — a simple touch is all that’s required. Because the response is generated using public key cryptography and is tied to the specific service’s domain, it cannot be intercepted or replicated by attackers.
Authenticator apps generate time-based codes that a user types during login. These codes can be intercepted in real time through sophisticated phishing attacks that proxy the login session — the attacker receives the code before it expires and uses it themselves. A YubiKey is immune to this attack because it generates a cryptographic response that is bound to the legitimate service’s domain. A phishing site cannot obtain a valid response, even if the user is completely deceived by it. This phishing resistance is the key distinction.
The right model depends on your devices, the services you need to protect, and your security requirements. For most businesses, the YubiKey 5 Series provides the broadest compatibility and the most flexible deployment options. If you have specific FIPS compliance requirements, the YubiKey 5 FIPS range is appropriate. If biometric authentication is a priority, the YubiKey Bio Series is worth considering. Our team is happy to talk through your requirements and recommend the right model — give us a call on 0117 3700145.
YubiKeys are compatible with thousands of services and applications, including Microsoft 365, Google Workspace, Salesforce, GitHub, GitLab, AWS, Azure, Okta, Duo, most enterprise identity providers, and the majority of password managers. Compatibility is determined by the authentication protocols a service supports — FIDO2, WebAuthn, and U2F are the most widely supported and are all available on YubiKey 5 Series devices.
Yes — YubiKeys supporting FIDO2 can be used for fully passwordless authentication on compatible services, eliminating the password entirely. The user authenticates solely with the physical key and, on some models, a PIN or biometric. Passwordless authentication is increasingly supported by major platforms including Microsoft 365 and Google, and represents the direction of travel for enterprise security.
If a YubiKey is lost, access to accounts protected by it can be regained using backup authentication methods — most services allow you to register multiple keys or maintain a recovery code. Once recovered, the lost key can be deregistered from your accounts so it can no longer be used. This is why we recommend registering at least two YubiKeys per user where possible — one primary and one backup. Our team can advise on the right approach for your deployment.
Setup is generally straightforward — users register their YubiKey with each service they want to protect, which typically takes a minute or two per service. For larger deployments, enterprise identity providers like Azure AD, Okta, or Duo can centralise YubiKey management, making it possible to deploy and manage keys at scale. Our team can advise on the right approach for your environment.
Yes — YubiKey models with NFC support work with compatible iOS and Android devices by tapping the key against the device. USB-C models work directly with modern phones and tablets that have a USB-C port. For devices with Lightning connectors, a specific Lightning variant is available. Our team can confirm which models are best suited to your device mix.
Reconditioned YubiKeys are pre-owned devices that have been thoroughly tested and verified to be fully functional. They support exactly the same authentication protocols and security features as new equivalents. Reconditioned keys are an excellent option for businesses that need the security benefits of YubiKeys at a reduced cost, and we’re happy to advise on availability and suitability for your requirements.
Simply get in touch with our team — call us on 0117 3700145 or use the enquiry form on this page. We’ll discuss your requirements, confirm the right models and quantities for your needs, and get your order sorted. We’re here Monday to Friday, 8:30am to 5:30pm, and always happy to help.
“Its been a few months now since we moved to ‘We Do Your IT’ and have nothing but good things to say. I had concerns that the change from one provider to another would cause problems but ‘We Do Your IT’ made the whole process seamless and easy. In addition, we are now getting a better service whilst paying less! I would have no hesitation in recommending the team at ‘We Do Your IT’ and will be happy to speak to any potential new prospects and say so. Thanks again”
John Calder – Pure Feed
This website uses cookies to improve your experience. Choose what you're happy with.
Required for the site to function and can't be switched off.
Help us improve the website. Turn on if you agree.
Used for ads and personalisation. Turn on if you agree.