Get Help Now
CONTACT US

From the Cybersecurity News Desk

Multifactor Authentication – Not Necessarily a Silver Bullet

Multifactor authentication (or MFA) is being widely promoted in the cybersecurity landscape as a must-have – and certainly it significantly improves security.  In fact, the Cybersecurity and Infrastructure Security Agency asserts organizations are 99% less likely to get hacked if they implement MFA.  However, it is not, in and of itself, the magic pill that solves all cybersecurity ills.

“Using MFA as a tool in your cybersecurity arsenal is essential, but understand that it is not foolproof,” warns Kevin Geil, Security Specialist, Incident Response with GreyCastle Security. “Credential compromises,” continued Geil, “commonly lead to business email compromise and ultimately devastating attacks.  As adoption of MFA increases, expect attackers to gain skill in bypassing this control.”

In fact, credential compromise is identified as the first link in 50% of security incidents.

According to Cybersecurity Dive, organizations who have implemented MFA haven’t always made the necessary implementations of stronger identity security, leaving them vulnerable to social engineering.

So, what’s the takeaway? 80% of all cybersecurity incidents are related to the effective compromise of people – not tech stack.  Be sure that along with strong technology solutions such as MFA, you also include employee awareness training programs and other anti-phishing measures to help mitigate social engineering attacks.

See How We Can Help!

Fill out this form and we’ll be in touch shortly

    Number of Employees - select one:
    Industry - select one:

    Through our comprehensive approach to cybersecurity, we’ll help ensure your organization is protected from evolving threats to tech such as MFA.

    CYBER OPERATIONS

    Incident Response

    Rely on us 24/7/365 to handle breaches, intrusions, malware, employee investigations, fraud and other incidents.

    Threat Hunting

    We proactively search through network and endpoint data to detect and isolate advanced threats that evade more traditional security solutions.

    Web Application Pen Testing

    Designed to identify weaknesses, vulnerabilities and exploits in web applications.

    View expert analysis on the latest threats 

    Finding qualified security professionals can be difficult and costly.

    Ours are the best. Put them to work for you.

    Contact Us
    Privacy Settings
    We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
    Youtube
    Consent to display content from - Youtube
    Vimeo
    Consent to display content from - Vimeo
    Google Maps
    Consent to display content from - Google
    Spotify
    Consent to display content from - Spotify
    Sound Cloud
    Consent to display content from - Sound
    Contact Us