![]() ![]() Inheritance factors, also referred to as biometrics, are the unique physical traits we all possess. To verify a user’s identity, they may receive a one-time passcode (OTP) sent to a smartphone, receive a unique code generated by a physical token, or need to insert a smartcard into a device. Possession factors include smartphones, hard tokens, soft tokens, key fobs and smartcards. These have become less secure as users fall victim to phishing attacks, hackers steal or buy passwords on the dark web, and people openly share personal information (answers to security questions) on social media sites. Other knowledge factors include PINs, passphrases and security questions (e.g., What was the name of your high school?). The most common knowledge factor is a password. Consequently, MFA stops most bad actors before they can enter your systems and gain access to your data. A hacker or unauthorized user may be able to steal a password or buy it on the dark web, but for them to gain access to a second authentication factor is slim and requires much more effort. Multi-factor authentication takes it step further by requiring users to provide proof from two or more authentication factors (categories) before access is granted. According to Microsoft, MFA can “prevent 99.9 percent of attacks on your accounts.”Īt a basic level, authentication requires proof that users are who they say they are. ![]() Using MFA to bolster password security with another form of authentication is proven to keep hackers out of your systems. However, weak or stolen passwords can be used to execute fraud attacks and data breaches when they are the only form of authentication required. In the past, requiring a static username and password to access an account seemed sufficient for security. Multi-factor authentication (MFA) reduces the risk of security breaches from occurring and keeps data safe.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |