Push-Bombing

Push-Bombing

You have probably heard or seen us talking about Multi-Factor Authentication (MFA) and how amazing it is as part of your security plan. The use of MFA has skyrocketed with the rise of technology. Think about how much work your company does that requires a username and password.

?

Hackers use various methods to get these login credentials. The goal is to gain access to business data as a user. You may be thinking – ‘well doesn’t MFA prevent these data breaches?’. Yes and no...MFA is a very effective at protecting cloud accounts and has been for many years. It is that effectiveness that has spurred hackers to find workarounds. One of these is Push-Bombing.

?

How Does Push-Bombing Work>

?

When a user enables MFA on an account, they typically receive a code or authorisation prompt of some kind. The user enters their login credentials, then the system send an authorisation request to the user to complete their login.? The MFA code or approval request will usually come through some kind of ‘push’ message. You can normally receive it in a few ways:

-????????????? SMS

-????????????? Popup

-????????????? App notification

Receiving the notification is a normal part of the multi-factor authentication login. It is something the user would be familiar with. With push-bombing, hackers start with the user’s credentials. They may get them through phishing or from a large data breach password dump.

?

They take advantage of the push notification process. Hackers attempt to log in many times. This sends the legitimate user several push notifications, one after the other. Many people question the receipt of an unexpected code that they didn’t request, but when someone is bombarded with these it can be easy to mistakenly click to approve access.

?

Here are some ways you can combat this scam:

?

Educate Employees

Knowledge is power. When a user experiences a push-bombing attack it can be disruptive and confusing. If employees have education beforehand they will be better prepared to defend themselves. Let employees know what push-bombing is, how it works and what to do if they think that they may be the victim of an attack.

?

Reduce Business App Sprawl

Did you know that on average, employees use 36 different cloud-based services per day. The more logins someone has to use the greater risk of a stolen password. Take a look at how many apps your business uses and see if there is a way you can consolidate them.

?

Enforce Strong Password Policies?

For hackers to send several push-notifications, they need to have the user’s login. Enforcing strong password policies reduces the chance that a password will get breached. Standard practices include:

-????????????? Using at least one upper and one lower case letter

-????????????? Using a combination of letters, numbers and symbols

-????????????? Not using personal information

-????????????? Storing passwords securely

-????????????? Not reusing passwords across several accounts

?

?

Multi factor authentication alone isn’t enough. Companies need several layers of protection to reduce their risk of a cloud breach.

If you need any help or advice, get in touch!

?

?

要查看或添加评论,请登录

Owen Williams的更多文章

  • Smart Homes - Are They a Security Risk?

    Smart Homes - Are They a Security Risk?

    Nearly everyone has at least one smart home device. They are super popular and convenient but they can also pose a…

  • Have You Gone Cashless?

    Have You Gone Cashless?

    The world has gone digital. Gone are the days of cash, cheque or debit.

  • Is Your Backup Setup Properly?

    Is Your Backup Setup Properly?

    If you have ever lost your business’s data, you know that it is a nightmare. Even if it was only temporary.

  • Malvertising - What is it?

    Malvertising - What is it?

    As you will know there are many different varieties of malware. One of the most common types is ‘malvertising’.

  • Security on a Budget

    Security on a Budget

    Cybersecurity is no longer a luxury or an option for small businesses. It is a necessity.

    1 条评论
  • Windows 11 Updates

    Windows 11 Updates

    Have you seen the Windows Photos app? It might seem like a basic tool for viewing and managing images. However, with an…

    1 条评论
  • Polish your Communication

    Polish your Communication

    Drafting emails, writing reports, creating social media posts or collating a presentation, spelling mistakes and typos…

    3 条评论
  • Mobile-Optimised Working

    Mobile-Optimised Working

    Ever since the dreaded Covid, adaptability reigns when it comes to working and business. Today’s workspaces transcend…

  • Deepfakes and How to Spot Them

    Deepfakes and How to Spot Them

    Have you seen those videos of celebrities saying something outrageous and later you find out that it was made up and…

  • Downtime - Tips and Tricks

    Downtime - Tips and Tricks

    A business network is the lifeblood of operations. It’s the digital artery that pumps data through your organisation.

社区洞察

其他会员也浏览了