What is Multi-factor authentication?
Multi-factor authentication (MFA) is an authentication method that requires the user(s) to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN. MFA is a core component of a strong Identity and access management policy.
Why Is MFA Important?
Keeping your organization secure by requiring users to identify themselves by more than a username and password will decrease your likelihood of a cyber-attack significantly. Usernames and passwords alone are vulnerable to brute force attacks and can be stolen by third parties. Enforcing MFA means increased confidence that your organization will stay safe from cyber criminals. Microsoft had found MFA blocks 99.9 percent of automated cyberattacks on Microsoft platforms, websites, and other online services.
How Does MFA Work?
MFA works by requiring additional verification information (factors). One of the most common MFA factors that users encounter are one-time passwords (OTP). OTPs are those 4–8-digit codes that you often receive via email, SMS or some sort of mobile authenticator app. With OTPs a new code Is generated periodically or each time an authentication request is submitted.
There are three main types of MFA Authentication methods. Most MFA methodology is based on one of three types of additional information:
Other Types of Multi-Factor Authentication
As MFA integrates machine learning and artificial intelligence (AI), authentication methods become more sophisticated, including:
Multi-Factor authentication is quite simple to have setup, but extremely difficult to breach. Having MFA will help ensure that you do not fall victim to a cyber-security attack. If you’d like to know more about MFA, or curious if it is available for your business, please contact Mnemonix at (616) 855-2847 or email at [email protected].
Multi-factor authentication (MFA) is an authentication method that requires the user(s) to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN. MFA is a core component of a strong Identity and access management policy.
Why Is MFA Important?
Keeping your organization secure by requiring users to identify themselves by more than a username and password will decrease your likelihood of a cyber-attack significantly. Usernames and passwords alone are vulnerable to brute force attacks and can be stolen by third parties. Enforcing MFA means increased confidence that your organization will stay safe from cyber criminals. Microsoft had found MFA blocks 99.9 percent of automated cyberattacks on Microsoft platforms, websites, and other online services.
How Does MFA Work?
MFA works by requiring additional verification information (factors). One of the most common MFA factors that users encounter are one-time passwords (OTP). OTPs are those 4–8-digit codes that you often receive via email, SMS or some sort of mobile authenticator app. With OTPs a new code Is generated periodically or each time an authentication request is submitted.
There are three main types of MFA Authentication methods. Most MFA methodology is based on one of three types of additional information:
- Things you know (knowledge), such as a password or PIN
- Answers to personal security questions
- Password
- OTPs (Can be both Knowledge and Possession - You know the OTP and you have to have something in your Possession to get it like your phone)
- Things you have (possession), such as a badge or smartphone
- OTPs generated by smartphone apps
- OTPs sent via text or email
- Access badges, USB devices, Smart Cards or fobs or security keys
- Software tokens and certificates
- Things you are (inherence), such as a biometric – fingerprint or voice recognition
- Fingerprints, facial recognition, voice, retina or iris scanning or other Biometrics
- Behavioral analysis
Other Types of Multi-Factor Authentication
As MFA integrates machine learning and artificial intelligence (AI), authentication methods become more sophisticated, including:
- Location-Based
- Based on a user’s IP address and, if possible, their geo location
- User access can be blocked if the location does not match what is specified on a whitelist or may require addition authentication if it originates from an unknown location
- Adaptive Authentication or Risk-Based Authentication
- Analyzes addition factors by considering context and behavior when authenticating
- Looks for certain factors such as location, if the user is trying to login during normal hours, the device used and whether it’s a public or private network.
- Risk level is based on the factors mentioned previously, and if that risk level returns high enough, the user will be prompted with an authentication method
Multi-Factor authentication is quite simple to have setup, but extremely difficult to breach. Having MFA will help ensure that you do not fall victim to a cyber-security attack. If you’d like to know more about MFA, or curious if it is available for your business, please contact Mnemonix at (616) 855-2847 or email at [email protected].