Are You Having A Technology Emergency?

True North Networks Blog

8 Reasons To Support Use of Multi-Factor Authentication


It’s no surprise that IT company’s plates are already heaped with a mountain of priorities. In addition to keeping the network up and running and fulfilling the many competing requests from departments across the organization, they now need to think strategically about supporting business growth while also keeping security top of mind.

Admins have installed antivirus software, raised the firewall, deployed encryption technology, and periodically run vulnerability tests. But the sobering reality is that if multi-factor authentication (MFA) is not in place, these other security measures can be bypassed. A best practice for IT managers is to categorize their systems to identify the ones that contain access to business-critical data, and then add MFA on top of those. MFA has low complexity, making it an easy addition and can be rolled out quickly without busting the budget

8 reasons to support use of multi-factor authentication

  1. Identity theft is an easy, low-risk, high-reward type of crime and a threat to all businesses. It is the fastest-growing type of crime and is now more profitable than drug-related crimes.
  2. Weak or stolen user credentials are hackers' weapon of choice, used in 95 percent of all Web application attacks.
  3. From 2013 to 2014, the number of successful breaches went up by 27.5 percent. The malicious actors are winning the war.
  4. Headlines tend to belong to the household-name companies, but they are not the only companies being targeted. Of all targeted attacks, 31 percent are aimed at businesses with fewer than 250 employees.
  5. Anti-virus systems and advanced firewalls are necessary security elements, as are vulnerability tests. Without user authentication, though, the front door is wide open to intruders.
  6. Password theft is constantly evolving as hackers employ methods like keylogging, phishing, and pharming.
  7. Cyber criminals do more than merely steal data. Often they destroy data, change programs or services, or use servers to transmit propaganda, spam, or malicious code.
  8. Employees are already accustomed to authenticating themselves in their personal lives, as providers of online services like home banking, gaming, social media, and email have all adopted mobile-based tools to effectively authenticate their users when accessing their systems.


Amazon's Ring Video Doorbell Lets Attackers Steal ...
NordVPN Confirms It Was Hacked
Comment for this post has been locked by admin.


By accepting you will be accessing a service provided by a third-party external to