It seems that everything we use these days requires a password. From email and social media accounts to everything in between, we always need a password to gain access.
But it isn't as simple as just coming up with one password and using it for everything. At least, it would be best if you weren't doing that...
Using one password over and over for all of your accounts is incredibly risky. If one account has been compromised and you use that same password for everything, then all of your accounts have effectively been compromised.
That’s why cybersecurity professionals have created a thing called multi-factor authentication (MFA)— and in this post, we’re here to tell you all about it.
Be honest— have you ever created a less-than-secure password? Chances are, you have, even if you didn't realize it. You probably even use it over and over again across numerous accounts or some slightly altered variation of it.
After all, creating a unique password for hundreds of online accounts makes it difficult to remember them all— and people create weak passwords as a result.
The problem is... since nobody wants to forget their passwords, many passwords contain easy-to-remember pieces such as family member names, pet names and important dates. A major “no-no” for proper password protection!
Through open-source intelligence gathering, attackers called social engineers can find information about you online, creating a breadcrumb trail to guess your password. This is just one of the reasons that passwords are easy to crack these days. Another reason is the existence of password cracking tools that allow attackers to try hundreds or thousands of passwords in a matter of minutes.
You may be wondering to yourself, "If passwords are not secure, what do we do to keep our applications and accounts safe?" Enter multi-factor authentication.
In an MFA environment, a password alone is not enough to gain access. The password may still be needed, but it's just one piece of the puzzle. Along with the password, additional factors are required to prove that the individual is authorized to have access.
Multi-factor authentication is a method for authenticating in which a user must provide two or more factors for verification.
When having multiple lines of defense in place for gaining access, true MFA requires that the factors used to gain access are not the same type of factor.
PRO TIP: Since you always want to use two unique kinds of MFA factors, you wouldn't want to use a password and security questions for your two factors as they are both knowledge factors.
The possession type refers to anything that you have on you.
Mobile devices
Key fobs
Access badges
Security tokens
Etc.
Inheritance-based factor types generally refer to biometrics.
Fingerprint scans
Iris or retina scans
Voice recognition
While knowledge, possession and inheritance are the three most commonly used MFA factors, the following two are also worth mentioning:
Computers and other devices can detect patterns in the way that we behave as humans. For example, a computer may be able to tell us apart from another person based on patterns in our typing. Although it is far rarer, behavioral factors have been used in MFA environments.
Location is another factor that is sometimes used to help authenticate a user. For example, if you are supposed to be logging into an account from New York, but the device sees that you are logging in from Tokyo, it may block access.
Company assets are valuable and must be protected at all costs. Passwords simply don't cut it.
Strong password hygiene and MFA are only one part of your security equation.
Download our free 5-½ Steps Guide to Avoid Cyber Threats ebook for a holistic picture of what protection means for your organization.