Combat Data Breaches, Weak Passwords, and Phishing Attacks with MFA
Forrester Research has estimated that 80 percent of security breaches involve weak, default, stolen, or otherwise compromised privileged credentials. As a result, cybersecurity experts have recommended augmenting usernames and passwords with multi-factor authentication (MFA) to add an additional layer of security for access control.
By adopting an “MFA Everywhere” approach, organizations can establish a reliable deterrent and ultimately minimize the risk of lateral movement of threat actors across networks. Many seem to have adopted this best practice. In fact, a recent study by Javelin Strategy & Research found that reliance on passwords declined from 56 percent to 47 percent over the past year, as organizations increased their adoption of both traditional MFA and strong authentication.
Watch this CyberCast on-demand to learn more about best practices to minimize your exposure to credential-based cyber-attacks by enabling MFA Everywhere for privileged access. During this CyberCast we discussed:
- Cybersecurity trends that drive the need for advanced authentication methods
- Ways passwords are compromised
- A breakdown of two-factor authentication (2FA), multi-factor authentication (MFA), and adaptive MFA
- Common types of MFA authenticators and their strengths and weaknesses
- The myth of the demise of MFA
- The likelihood of ultimately moving the world beyond passwords