News and Articles
November 1, 2021
No matter how strong password credentials may be to secure an account, there are often equally strong attacks against them. When establishing appropriate access for users, it’s important that users prove they actually are who they claim to be. Multi-factor authentication, or MFA, is an authentication method that requires the user to provide two or more credentials in order to gain access to an account. In fact, MFA has become a common requirement from cyber underwriters in order to secure coverage and is a core component of a strong identity and access management policy.
Guarding Against Attacks
MFA helps protect against unauthorized access, data breaches and password-based cyber attacks. It serves as a second barrier by verifying something a user can know (such as asking for your mother’s maiden name or where your first job was held), something a user has (such as a unique key, a cell phone with a code), or something physical about a user (such as facial recognition, fingerprint scan). If this second factor of authentication cannot be verified, then the account remains locked, and a potential attack is prevented.
Expanding MFA Protection
One expansion of two-factor authentication is something called Risk-Based Authentication, or Adaptive Authentication. This process analyzes additional factors by considering context and behavior when authenticating and often uses these values to assign a level of risk associated with the login attempt. For example:
- Location: From where is the user when trying to access information? Does it fit previous patterns?
- Time: When you are trying to access company information? Is that time atypical?
- Device: What kind of device is used? Is it the same one used yesterday?
- Connection: Is the connection via private network or a public network?
The risk level is calculated based upon how these questions are answered and can be used to determine whether or not a user will be prompted for an additional authentication factor or whether or not they will even be allowed to log in.
Tips to Protect Your Organization
99.9% of account compromise attacks can be blocked by MFA. Some tips to help protect your organization include:
- Implementing a strong multifactor authentication solution, such as an app or hardware dongle
- Checking that your cloud providers support strong authentication
- Adding a PIN or passphrase to cell accounts to prevent criminals from swapping SIM cards using stolen information
- Making sure you have cyber coverage in place to add another layer of protection
Where Should MFA Be Implemented?
To thrive in the modern threat landscape, MFA needs to be expanded beyond just the most privileged accounts into all access to all systems. MFA is recommended to be implemented in these areas:
- Privileged user accounts
- Remote access to computer systems by employees
- Remote access to computer systems by vendors and independent contractors
- Remote access to email
- Cloud resources (Office 365, etc.)
- Remote Desktop Protocol (RDP) and virtual desktops
- To restrict access to your backups
- For any additional applications (internal or external) that contain personally identifiable information
Types of Multifactor Authentication
MFA is successfully enabled when at least two of these categories of identification are required in order to successfully verify a user’s identify prior to granting access:
- Inherence: Fingerprints, voice or facial recognition.
- Possession: A badge or cellphone.
- Knowledge: A password or personal pin. ◼
How Inflation Affects Management Decisions
September 23, 2022 | Effective business managers always have an eye on the bottom line. One of the most critical factors for industries to monitor is inflation… more ▶
Planning Construction Around Severe Weather
September 14, 2022 | The progress of a construction project is influenced by a wide range of factors, including employee speed and adherence to the schedule… more ▶
How Technology is Shaping Healthcare
September 2, 2022 | Few industries have been revolutionized by technological developments quite the way that healthcare has. Technology has become a central feature… more ▶