Security is only as strong as your weakest link. And, as the bad actors know, that weak link is often single factor authentication. Compromised credentials remain the primary root cause of 80% of all data breaches (VBIR). The most recent example is the Colonial Pipeline ransomware attack, which has been traced back to the company’s VPN that was protected by only a single password.
Adopting multi-factor authentication (MFA), where two or more credentials must be presented to verify user or device identity before granting access, exponentially decreases the possibility that an attack will be successful – even if passwords are compromised. Yet, many companies have remained hesitant about deploying MFA, citing concerns over increased friction, cost and complexity.
The obvious answer is that the cost, complexity and lost productivity of a data breach or ransomware attack is infinitely worse. More importantly, modern MFA is seamless and secure, using smart authenticators like mobile push, digital certificates and smart phone biometrics to provide an almost invisible layer of security. Some MFA best practices include:
- Protect valid credentials from compromise – Start with a device reputation check to establish trust in the device first to prevent the compromise of otherwise valid user credentials.
- Verify identities digitally – Let users confirm their identity from the comfort of their own couch in under a minute with a few high-resolution snaps of their government issued ID and a selfie. The pics are validated for document authenticity and to ensure the person presenting the credential is not only the person on that credential, but also a live person.
- Apply contextual awareness – Adaptive risk-based authentication provides the context you need to identify suspicious patterns so you can decide to allow, block, or challenge the user with step-up authentication.
- Realize one set of secure login credentials - Multiple login credentials frustrate users and contribute to poor password hygiene. Single Sign-on (SSO) resolves both issues with one secure login. Better yet, go passwordless!
- Remove the password - No password, no password hacks. Passwordless login options include mobile push, FIDO keys and credential-based passwordless authentication.
With an intensifying threat landscape, there is no rational excuse to continue to rely solely on passwords or other forms of SFA. Post Solar Winds, the US government has recognized this with the recent Cybersecurity Executive Order that mandates government agencies adopt MFA within 180 days. As well, other government departments are upping their cybersecurity game including the Department of Defense with their Cybersecurity Maturity Model Certification program that requires MFA for defense contractors as evidence of good cybersecurity hygiene.
As more and more organizations up their own cybersecurity game with MFA, don’t be left as the easy target on the block.
Interested in learning more about modern MFA, join our upcoming webinar, Identity as a Service: Born in the Cloud, Offered as a Service. Register here: https://www.brighttalk.com/webcast/17380/492466.