Securely Deploying and Using MFA
Using multifactor authentication (MFA) is one of the best things you can do to protect yourself and your environment. MFA prevents a large percentage of cyberattacks. You should use it when and where you can to protect sensitive data and systems.
However, anything can be hacked or bypassed. Any MFA solution, strong or weak, can be hacked and bypassed.
You should absolutely still use MFA when and where you can to protect sensitive data and systems.
To mitigate many of the inherent risks of MFA, follow these recommendations:
Example: Fail-close settings, disable older, weaker, legacy protocols, etc.
领英推荐
No matter what type of MFA solution(s) you have or use, educate yourself and all other stakeholders, especially end-users, about the following topics around the particular MFA solution being considered or used:
Never assume that anyone has all the appropriate education and understanding about a specific MFA solution. Good education is a great way to reduce the risk of cybersecurity threats.
MFA is a cybersecurity tool that all users and organizations should implement to protect sensitive data and systems. MFA solutions should be securely selected and implemented along with education to mitigate some of the inherent risks.?
Enabling Businesses to Safeguard Digital Assets and Scale Securely | Veteran Cybersecurity Leader | Specializing in Security Operations & Incident Response | Founder @ The Cyber Samaritans
2 年FIDO U2F != AiTM success
Data & Information Security für KMU, Enterprise und GOV
2 年Hm, sounds like a kind of turnaround in comparison to former critizism?