April 13, 2021

CISO’s Guide to Multi-Factor Authentication

Who became a CISO to manage as many passwords as possible? Or spend their whole security budgetto password breaches? None!

 

Passwords have widely been considered terrible for a long time, and not just because they are a pain to manage. In the last few years, passwords have become a highly insecure way to authenticate - susceptible to theft, interception, and increasingly up for sale to the highest bidder.

 

When you combine people with passwords, people tend to do what’s easiest: passwords get recycled across accounts. This is why cybercriminals harvest credentials through phishing and malware. With more than 20 billion credentials readily available on the dark web, threat actors can spray passwords across multiple hundreds of domains of choice, breach vulnerable systems to gain unauthorized access to resources.

Passwordless Security

 

A huge surge in cyberattacks over the past decade, topped with massive identity breaches in recent incidents involving SolarWinds and Microsoft Exchange servers, has caused enterprise leaders to seriously reevaluate their authentication strategies. Globally, CISOs are realizing that despite prior investments in reducing the pain of passwords, SSO itself has become a single point of failure. This puts a big target on enterprise access management. Adopting an intelligent multi-factor authentication (MFA) is now crucial to regaining a security posture that is even remotely defensible to shareholders, partners, customers, and regulators.

 

Yet, traditional MFA has been hard to use, resulting in a cumbersome digital experience. MFA has also been difficult to administer and costly to maintain. As a result, enterprise CISOs have felt trapped between an increasing attack surface on one side and a user rebellion on the other.

 

 

Hackers are persistently attacking every organization in the world, including yours. You need to protect against attackers stealing the identity of your workforce, partners, and customers. Adding Intelligent MFA provides a layered defense against threat actors getting into a device, database, or network and wreaking havoc on your critical data.

 

At Acceptto, we pioneered a new approach called passwordless continuous authentication that combines a behavioral-based MFA with a dynamic level of assurance. This provides better protection, lower TCO, and eliminates MFA fatigue for both users and administrators. 

 

Read more in our e-book on the evolution of MFA. It answers the following questions:

 

  • What is MFA, and why do I need it?
  • What are the current real-world challenges of MFA?
  • How do various MFA options stack up for the enterprise?
  • How do I implement or dramatically improve MFA in my enterprise?

 

Our MFA e-book also walks through best practices for the following MFA deployment use cases: 

 

  • Don’t have MFA yet
  • Have MFA, but want to minimize its friction
  • Need MFA for some applications, but not others
  • Need Constant MFA (Zero Trust Model)


Download the e-book here.

 

By Alan Krassowski, Vice President of Technology  

 

MFA passwordless continuous authentication eliminate passwords Intelligent MFA