The threat landscape evolves constantly. Organizations that do not strive to stay one step ahead of it expose themselves to risk, hence the reliance on strict IT security policies and a myriad of security tools. <\/p>\n\n\n\n
However, all of that does little to address the weakest link: user irresponsibility. An average user has dozens of personal and business accounts they need to manage, so they tend to reuse passwords.<\/p>\n\n\n\n
What could happen then is the same password they use for admin access on their organization\u2019s cloud could be leaked from the dubious social app they\u2019ve been using. <\/p>\n\n\n\n
Using only a single password to authenticate users leaves an insecure vector for attack. Identity attacks are rarely thwarted solely by the length or complexity of a password – in fact most password compromises are because of phishing so the hacker has the complete password or because they compromised another site where a password was reused.<\/p>\n\n\n\n
So what should organizations, particularly those with a large number of users, do to reduce password fatigue<\/a> and ensure a higher level of security?<\/p>\n\n\n\n
The solution to this dilemma is actually rather simple. By using Multi-Factor Authentication<\/a>, IT organizations can address the weakest link in their security paradigm. In fact, you can think of a single password with MFA enabled as having an infinite number of unique passwords because of the MFA addition. <\/p>\n\n\n\n
Multi-Factor Authentication (MFA) is also referred to as two-factor authentication (2FA)<\/a>. It adds an additional layer of security to the sign-in process. The user is required to provide an additional form of identification to gain access.<\/p>\n\n\n\n
MFA requires two or more of the following methods for successful authentication:<\/p>\n\n\n\n
What usually happens is the MFA requirement surfaces once a user logs in with their password. The system may send a code to their registered cell phone, require a code generated by an app like Google Authenticator, or from a Universal 2nd Factor key<\/a>. It may also require the user to scan their fingerprint or face should the device compatibility exist.<\/p>\n\n\n\n
Device-based MFA requires the user to clear the secondary authentication requirement when logging into their device, either when it boots up or when the login occurs. In order to access the device, the user will need their login credentials in addition to the MFA code. <\/p>\n\n\n\n
This significantly reduces the risk of unauthorized access to the device, while adding a secondary, downstream impact on preventing unauthorized use to the IT resources an employee\u2019s device can access. Coupled with full disk encryption<\/a>, this process can dramatically step-up security on a device.<\/p>\n\n\n\n
Through modern, cloud-based solutions, device-based MFA is becoming much more straightforward; IT admins can implement MFA for Mac<\/a> and Windows devices, while some can even support MFA for Linux-based devices as well.<\/p>\n\n\n\n
Application-level MFA is a more granular approach whereby the user is required to clear secondary authentication when seeking access to individual apps. While the underlying principle is the same as device-based MFA, it\u2019s a more frequent occurrence as users may have to go through the process every single time they login.<\/p>\n\n\n\n
This MFA method is great for a platform or device-agnostic environment, or ones that support BYOD policies<\/a> that allow employees to access IT resources via their personal devices. It\u2019s also a core method for conditional access capabilities<\/a>. <\/p>\n\n\n\n
Time-based One-Time Passwords (TOTPs) sent on the registered email or cell phone number work well as a secondary authentication factor for application-level or device-level MFA. When a login is detected, the system sends a TOTP MFA code<\/a> to the registered method and only grants access once the correct TOTP is entered by the user.<\/p>\n\n\n\n
Additionally, if push notifications are implemented via a mobile app like JumpCloud Protect<\/a>, another layer of security exists naturally thanks to the biometrics inherent in today\u2019s mobile phones (e.g. facial recognition login or fingerprint authentication).<\/p>\n\n\n\n
It\u2019s important to be mindful of the end user\u2019s capabilities when deploying MFA for both Devices and Applications. A complex solution involving physical keys might be easily adaptable for the IT administrators in your organization but not for those in a customer support role, for example. MFA accessibility<\/a> is critical.<\/p>\n\n\n\n
It is very important to consider ease and convenience for the end user when deploying MFA. The biometric factor is a good choice as it\u2019s not only incredibly secure, but can be very easy to use. <\/p>\n\n\n\n
The end user simply has to place their finger on the scanner or use the device\u2019s camera to scan their face. Not only is the biometric hardware in devices more secure and faster than ever before, but this factor does not rely on any kind of digital communication (such as an email or SMS verification code). This means the possibility of it being compromised is even further reduced. <\/p>\n\n\n\n
Push notifications are increasingly becoming the MFA method of choice for applications as they have a number of inherent benefits to both security and ease of use. They\u2019re incredibly easy for the end user who only has to tap once on a notification from their smartphone (which they are rarely far from) to authenticate. <\/p>\n\n\n\n
Not only that, but often the user also has to enter their PIN or authenticate via fingerprint or facial recognition to complete the action (or they used that method to gain access to the smartphone), adding in an additional factor seamlessly to increase security. Because this method requires the user to be in possession of the device on which the notification is sent, it is virtually impossible for remote attackers to gain access.<\/p>\n\n\n\n
Organizations that realize the benefits of MFA often rush to deploy it in one fell swoop. That can end up being counterproductive. The initial step before implementation must include user education to avoid pushback, confusion, or a painful rollback. <\/p>\n\n\n\n