MFA and the Consequences for Companies Who Don’t Use It
MFA and the Consequences for Companies Who Don’t Use It

MFA and the Consequences for Companies Who Don’t Use It

The reality is that employees do fall for phishing scams and they do share passwords, and if you’re not using multi-factor authentication (MFA), your organization is wide open to attacks.

A huge, if not one of the biggest, security threat today is the risk of compromised credentials. And the reason is pretty simple to explain. Once a cybercriminal puts his hands on a set of corporate credentials, he is now using stolen but legitimate login details. From there, all of your security tools will consider that the person logging in is actually the person to whom the credentials belong. Basically, none of your tools are going to flag anything unusual which makes those attacks very hard to detect.

How login credentials are effortlessly compromised
IS Decisions’ research into the access security priorities of 500 IT Security Managers in the US and UK

Knowing the risk, a huge number of organizations are still going the wrong way about password security.

Our survey from a few years ago revealed that only 38% of organizations use MFA. Today, unfortunately, things haven’t changed according to some more recent research.

What are the reasons organizations are hesitant to adopt MFA?

MFA is only beneficial for companies of a certain size

This is 100% wrong! Any company, regardless of size, should adopt an MFA solution as part of their security strategy. The data small and medium sized businesses (SMBs) want to protect is no less sensitive and the disruption is no less serious. MFA is not necessarily complex, costly or frustrating!

Before you continue reading, how about a follow on LinkedIn?
MFA should be used only to protect privileged users

Still wrong. The vast majority of organizations consider most of their employees as not having access to critical information, so they rely only on local Windows credentials. They don’t see the point of using MFA, it seems a bit too much. The thing is, those “non-privileged” employees still have access to a large amount of data that can actually harm the company. Let’s illustrate with an example: a nurse sells a celebrity patient’s data to a newspaper. This example shows the value of the data and the harm that can be done if it’s used in an inappropriate way.

Furthermore, it’s very rare for a hacker to start with a privileged account. Most cyber attackers leverage any account that will fall victim to a phishing scam. Then, they move laterally within the network until they find valuable data to exfiltrate.

MFA is not flawless

This is true. Actually, no security solution is flawless but MFA is pretty close. The FBI published a warning last month about events where attackers were able to bypass MFA. The two main authenticator vulnerabilities are ‘Channel Jacking’, which involves taking over the communication channel used for the authenticator ⁠and ‘Real-Time Phishing’, ⁠which involves using a machine-in-the-middle in order to intercept and replay authentication messages. For such type of attacks, experts agree that considerable costs and effort are required. Mostly, attackers who encounter MFA will just move on to their next target rather than try to bypass this measure. You can also take simple precautions in order to avoid certain vulnerabilities. To start with, you can choose MFA authenticators that do not rely on SMS authentication. (The National Institute of Standards and Technology (NIST) discourages SMS and voice in its latest Digital Identity Guidelines).

Despite the recent events and it’s warning, the FBI confirms that multifactor authentication is one of the easiest steps to improve an organization’s security and that it’s still effective.

The reality is that employees do fall for #phishing scams and they do share passwords, and if you’re not using MFA, your organization is wide open to #cyberattacks. #respectdata Click to Tweet

MFA interferes with employees’ productivity

That is not necessarily true. As with any new technology, the challenge is to least interfere with employee’s productivity. If it’s too disruptive, employees won’t tolerate it, adoption will be slowed down if not stopped abruptly.

For this reason, flexibility is needed for any MFA solution. Users don’t need to be prompted for MFA each time they log in. Contextual controls may be a great way to improve identity assurance. They use environment information to make sure whoever tries to log in is actually who they say they are without disrupting users.

Compromised passwords happens to everyone – whether you are a privileged or a non-privileged user. Any company, regardless of size should be using MFA as part of their security strategy as it can be one of the easiest ways to secure accounts.

 


Enjoyed the article?

Get notified of new articles and relevant events.

Thank you for being a part of the CPO Magazine community.

Something went wrong.

Before you go ...

How about giving us a follow?

Or let us notify you of new articles and relevant events.

Thank you for being a part of the CPO Magazine community.

Something went wrong.

Follow CPO Magazine