The power of multi-factor authentication
Authentication factors
Something you know
This is the most common authentication factor. Passwords and security questions are the most common examples of something you know. Unfortunately, using two factors of the same type together can reduce their effectiveness.
Something you have
We are seeing a rise in this factor and for good reason. Examples include a key card, a verification code sent to your smartphone or a random number produced on an authentication app. These are becoming very common and easy to add to your login process.
Something you are
This is the rarest factor but the most difficult to counterfeit. This security method authenticates you by measuring or recording something unique about you using biometrics. It could be fingerprints, palm prints, iris patterns, face or voice.
Multi-factor authentication is a major part of security in today’s fast-paced digital world. Hackers are getting more sophisticated with their attacks. When it comes to cyberattacks, MFA is one of the best tools you have.
MFA, or lack thereof, in action
In November 2023, Midnight Blizzard hackers breached Microsoft through a single account. This account was created inhouse by Microsoft and used for testing purposes. However, someone had mistakenly given this account admin privileges. And it didn’t have multi-factor authentication. If you had the password, you were in.
The hackers probed for weaknesses by trying the same password on many different accounts at once. This test account turned out to be a match. Once inside, the hackers used its admin privileges to create malicious applications and elevate their access.
In October 2023, hackers started selling personal genetic information on the dark web. This information appeared to come from 23andMe, a DNA testing service. How?
Attackers used a technique called “credential stuffing.” They took login information and passwords stolen from other services — such as email programs and online shopping platforms. Then they tested these logins and passwords on 23andMe. Unfortunately, many people reuse login and password information across different sites, and some of these stolen credentials allowed hackers to log into real 23andMe accounts.
This attack could have been avoided if the affected users had enabled 23andMe’s MFA options with their accounts. They would have received a message saying there was a login, and they could have denied entry to the attackers.
Want to learn more?
We understand that exceptional service delivery is only possible when our team is fully committed to purpose-driven work. That’s why we’re proud to lead the way in creating a culture of personal growth, development, and accountability. We believe that building strong relationships through trust and reliability is key to becoming an exceptional industry leader. Our ultimate goal is to help our clients succeed in today’s complex business environment.