Multi Factor Authorisation

Multi factor authentication (MFA) adds a layer of protection to the sign-in process. When accessing business systems, accounts or apps, users provide an additional identity verification, such as entering a code received by phone.

Multi Factor Authorisation

MFA creates a layered defence that makes it harder for an unauthorised user to access a system, such as a cloud service, computing device, network or database. If one factor is compromised , the attacker still has at least one more authorization method to compromise before successfully accessing their target.

MFA generally does not require businesses to make costly hardware changes, with SMEs able to use numerous low-cost/free tools available for MFA.

MFA Protects Against

Business Email Compromise
Currently one of most prolific attack threats, cyber criminals use compromised credentials to access 365 & Google cloud services when MFA is not enabled.

Password Reuse
Users often reuse the same username & password for business and personal logins. MFA protects your business systems from password compromise on third party sites.

Remote Worker connectivity
Using MFA for VPN or cloud service connections for remote workers protects your business systems from compromised remote endpoints.

Overview

Why Use MFA

Microsoft reports that over 99.9% of account compromise attacks can be prevented with MFA

Google says MFA can prevent over 95% of bulk phishing attempts

81% of breaches are the result of credential theft

73% of passwords are used for more than one account

63% of breaches can be traced to poor credential hygiene

 

Prevent Cyber Attacks

MFA is also effective at preventing ransomware attacks. these start when an attacker gains access to credentials. With MFA, the attackers don’t have the additional required information to access the target account and wider system.

MFA adds additional layers of authentication to protect systems and combat many types of cyber attacks, with a low cost footprint.

Passwords are Unsecure

Hackers log in to services using guessed or stolen passwords, via the below methods.

Using passwords from leaked datasets in case a user has reused a password on other services.

Socially engineering account details from users using phishing.

Logging into multiple user accounts using passwords on the commonly used password lists.

Contact Us

Get in touch for more information about MFA.