In this third part of my MFA mini-series, I am going to look at some of the resistance that we get when trying to implement multi-factor authentication. MFA – It is like medicine that tastes bad In the first part of this series, I briefly explained the highlights of why …
What’s Wrong with MFA
This is the second part of my Back-to-Basics MFA mini-series. Having spent last week’s article telling you how great Multi-factor Authentication is and how you and everyone in your organisation needs to use it for every service that offers it, today we are going to look at one of the …
Back to Basics – MFA
Use MFA or Multi-factor Authentication. End of article, well not quite… So you have heard of MFA but let’s clarify why it is a good idea I am not going to go into the technicalities of how MFA works – I have included a link below if you want to …
Fake Authenticator
Multi-factor Authentication – MFA – if you are unsure how this cyber security tool contributes to your security, then have a read of this: If you do know how important MFA is, then you will realise that a fake MFA app would cyber security chaos. Of course, the threat actors …
Credentials are King
Threat actors are always looking for good sources of valid (stolen) email and password combinations – and there are many hundreds of millions available to them. 361 million stolen accounts leaked on Telegram added to HIBP (bleepingcomputer.com) Once they have these credentials, the threat actors will be trying them out …
