Search
Close this search box.

Multi-Factor Authentication (MFA) Keeps the Cybergoblins Away

Avatar photo
Andrew Betts

Here’s a cybersecurity trick or treat for you. It’s Halloween. You hear the doorbell ring. Would you answer your door without looking to see who’s on the other side? Would you leave your door unlocked, knowing the night will be filled with strangers looking for candy – or worse? Without multi-factor authentication (MFA), you’re essentially doing just that with your data and your networks. MFA is like locking your door and checking to make sure whoever enters is allowed to come inside.

What is MFA?

Have you ever had to get your cell phone or check your email to type in a unique code before you can log in to your account? That’s MFA. When your customers set up an account, they provide the system with a mobile phone or email address they’ll use to receive a system-generated one-time code to access their account. It’s an additional step beyond using a password to prevent bad actors from getting access to information and finding a way to hack into your company’s networks. Every company that allows logins should use MFA at a minimum to prevent ransomware and cybercrime. Everyone who has the option to use MFA to log in to their online accounts should do so. Without it, attackers can easily get direct access to servers, systems, and sensitive information.

Too often, companies rely solely on single authentication tactics like Touch ID or a password. However, smart devices can recognize more than one thumbprint, and even fake fingerprints can successfully bypass sensors at least once nearly 80% of the time. While not an entirely bulletproof solution, MFA effectively creates additional hurdles for would-be attackers. Confirm that you and your customers practice MFA, even if it simply involves the extra authentication step of sending a one-time SMS to a trusted user’s device to ensure they’re valid. In 2019, only 57% of the employees at businesses worldwide used MFA. While this number was up from 12 percent of all global employees in 2018, it’s still lower than it should be.

AirGuard™, our flagship managed security service offering, includes MFA as part of the solution.

Train Your Team to Avoid These Tricks

It’s becoming more common for attackers to trick people into sharing passwords. They’ll send social media or email links that look legitimate. When the would-be victim lands on the page, they type in their password, and now the hacker has what they need to get into the system with the victim’s credentials and wreak havoc. MFA is the only way to prevent this; the critical control stops a hacker from logging in with just a password or Touch ID.

Some cybercriminals are even masquerading as IT or fraud security. They contact unsuspecting victims requesting them to share an MFA code generated for them or ask them to click a link to a lookalike site, allowing them to scrape the actual code the victim generates. Train your team, vendors, and clients to contact any company directly by typing in the URL or calling the company’s phone number to verify this request rather than simply complying with a stranger asking for a code or clicking any link they didn’t ask to receive.

MFA is Effective

By providing an extra barrier and layer of security that makes it incredibly difficult for attackers to get past, MFA can block over 99.9% of account compromise attacks.

MFA Authenticates Users

Make sure you know who’s coming inside your network. Keep out the ghouls who would harm your company through cybercrime by implementing MFA. Train your team not to click on unsolicited links without verifying they are legitimate. And contact Airiam if you’d like to bolster your cybersecurity to include MFA and other safeguards. We’ll work with you to determine the best way to stay safe from cybercrime at Halloween and all year.

Using MFA makes an organization more cyber resilient.   

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Podcast: In the Ransomware Recovery Trenches

Episode Summary The impact of ransomware on organizations is well-known. Companies can be coerced into making ransom payments. The business itself could be forced to close. Sensitive customer data can be leaked onto the Dark Web. An impacted organizati
Avatar photo
Bill Bowman
>>Read More

10 Ways IT Services Promote Growth

Do I Need IT Services? As a business owner, you want your business to be successful, scalable, and adaptable. You also want to make sure you’re creating unnecessary expenses. For IT services, sometimes that might feel like an unnecessary expense, but I
Vivian Lee
>>Read More

Why SMEs Need to Be Prepared for Ransomware Attacks

Preparing for Ransomware Attacks It seems like ransomware attacks have been continually in the news for the last several years. While we may be inundated with media reports of ransomware attacks targeting critical U.S. infrastructure or government agen
Vivian Lee
>>Read More