Multi Factor Authentication: Up Your Security Game

—Ruth Christensen | 06.29.20

Multi Factor Authentication: Up Your Security Game

Ruth Christensen, 06.29.20

There are over 300 million fraudulent sign-in attempts to Microsoft cloud services every day. Whoa.

Cyber threats are the real deal. All it takes is a single compromised log-in, and you could be facing a costly breach. In fact, the average cost of a security breach is $3.92 million.crime-robber

Complex passwords aren’t enough anymore. If you’re focused solely on passwords, it’s time to rethink your strategy.

Why Multi Factor Authentication?

Multi Factor Authentication (MFA) can block over 99.9% of account attacks. And yet, only 38% of organizations use it. Why? “There’s a misnomer that [MFA] can be complicated and that it’ll get in the way of user experience.” Richard Kaufmann, CISO, Amedisys. In reality, it’s a seamless experience.

 

What is Multi Factor Authentication?

toys-castleThink of your organization’s data like a castle. If passwords are the walls surrounding the castle, the moat and drawbridge are MFA. It’s one more obstacle cybercriminals must combat.

81% of breaches happen because of weak or stolen passwords. If a hacker tries to compromise the account holder’s password, the second layer of authentication keeps them from being successful. It’s the one-two punch against cyber security attacks.

How does it work?

There are many ways to implement MFA at your organization. There are a few different methods of authentication that can be used. This can be customized to create the right set up for your organization. There are typically 3 authentication factors:

  • Knowledge – like a password or PIN
  • Possession – like a badge or smartphone
  • Inheritance – like fingerprints or voice recognition

While the methods may vary, the results of MFA are the same.

 

Multi Factor Authentication in Practice

You may have already experienced Multi Factor Authentication without recognizing it as such. Online banking, social media, and other accounts you use in your personal life have adopted MFA. What does it look like?

phone-action-shield-1To log in, you would:

  1. Enter your password.
  2. Receive a random code (usually via SMS).
  3. Provide that random code to finish logging in.

For an organization, this process can be even more streamlined. For example, Microsoft’s Authenticator App allows users to approve a sign-in attempt with push notifications, biometrics, or one-time passcodes. If you have a Microsoft 365 subscription, you can enable MFA for free.

 

Don’t Forget Your People

95% of cyber security breaches are due to human error. You can only do so much as a CISO team. At the end of the day, a user has to protect themselves and the company. Security is everyone’s job, and collaboration is how to accomplish that job.

Educating your users is a difficult task. Especially because your users, for the most part, will not understand how technology benefits them. You need to do the homework and connect the dots. How does the technology help them with their job?

That’s what BrainStorm helps you do. We’re with you every step of the way to keep your users educated and your organization safe. Only 12% of learners can apply skills they learned in a training session to their actual job. That’s why BrainStorm’s SaaS solution, QuickHelp, uses machine learning to create a customized, one-on-one learning experience.

Get Started

Ruth Christensen
When Ruth first arrived on the scene at BrainStorm, she made an impression with her homemade cheesecake bars. Besides baking, Ruth loves to serve up delicious marketing content, read classic novels, and shop for wild-looking shoes.

Champions to the Rescue: Change Adoption from the Bottom Up

McKell Parsons, 09.10.20

Ready or Not, Here It Comes Keeping up in today’s world is a full-time job in and of itself. McKinsey Global Institute executives estimate that,.

Read More

7 Software Tips to Work More Effectively: Increase Efficiency Part 2

Jessica Roylance, 08.18.20

Who wants to get their work done faster? Oh yeah! Sounds like something everybody wants. Here’s how to use software to save time and show your boss.

Read More

9 Ways to Improve Your Desktop Productivity: Increase Efficiency Part 1

Jessica Roylance, 08.12.20

There’s really no need to boost your desktop productivity because computer work is always effective. Right? Not necessarily. The way you use.

Read More

5 Virtual Onboarding Essentials

McKell Parsons, 07.15.20

Nice to e-meet you In-office work may be on hold, but that doesn’t mean your business is. Even in quarantine, life goes on. There’s remote work to.

Read More