It is clear that the traditional username and password – an example of single-factor authentication – is no longer enough to protect an individual or organization’s sensitive data. To reduce the risk of credential and data theft and fraud, organizations should consider adopting multifactor authentication (MFA) as the standard for accessing information and other resources from all the organizations’ externally facing information technology (IT) systems.
How does MFA work?
Multifactor authentication uses a combination of at least two of the three types of independent mechanisms for authenticating that users are who they say they are. A mechanism can require something only the user knows, something only the user has, or something only the user is.
For example, requiring a password (something you know) and a key fob (something you have) is a form of MFA, and so is requiring a password and a biometric verification like a fingerprint (something you are).
Traditional hurdles
Organizations have been slow to adopt multifactor authentication because of multiple hurdles, including:
- Implementation cost. The cost of the required hardware is considered too high for the additional security MFA can offer.
- Maintenance cost. IT department budgets sometimes are unable to support the ongoing cost of purchasing, licensing, managing, and maintaining new systems.
- Lack of expertise or capacity to implement. IT departments sometimes have insufficient knowledge or capacity to implement and maintain the often complex technology.
- End-user annoyance. The additional step to authenticate is considered a hindrance by end users whose central concern is not security.
In recent years, MFA vendors have implemented more streamlined and affordable solutions that address these long-standing hurdles. In fact, with the trend of recent migrations to Microsoft’s cloud-based email and office suite solution Microsoft 365™ (formerly Office 365™), many organizations might have multifactor authentication for those services already included in their licensing.
Implementation options
Solutions by MFA vendors have advanced such that an end user no longer needs to carry a key fob or smart card. The most common secondary authentication mechanism uses the technology most people have with them the majority of the time: mobile devices.
Vendors now provide an array of options that companies can choose from when implementing MFA technology:
- Push notifications. An end user installs an application on a smartphone and accepts or denies requests to authenticate his or her identity in order to access company resources. IT staff can be notified of a potential compromise when the authentication is denied.
- Text messaging. When an end user attempts an authentication, a text message is sent to that user, the user replies, and then the user receives a one-time password (OTP).
- Certificates. A certificate is installed on an end user’s device, such as a company-owned laptop, and the device is trusted for a certain period of time. Upon expiration, the certificate is revoked and requires authentication again.
- Phone calls. An automated system calls the end user’s phone number on file, and the user receives an OTP or simply selects the star or pound symbol to verify his or her identity. Phone calls have the added advantage of supporting users who don’t have smartphones.
Although not all MFA vendors offer the solutions described here, implementing MFA is more reasonable and cost-effective for organizations than in the past, and the technology continues to evolve. To alleviate staffing issues and the cost of managing additional hardware and software, MFA vendors also offer cloud software-as-a-service solutions. The current trend in MFA services is to reduce the internal IT management that organizations require and to make authentication easier for the end user.
Adopting MFA
If budget constraints are keeping an organization from adopting multifactor authentication everywhere, the organization should use a risk-based approach to implement the technology where it is most needed. The organization should focus MFA implementation efforts on the largest attack vector – that is, the organization’s externally facing services such as email, virtual private networks, and remote-access technology.
Multifactor authentication might not be a silver bullet for preventing cybersecurity attacks. However, it is a front-line defense against credential theft that enables breaches and puts valuable data at risk. Despite the constant onslaught of credential-based attacks, as more organizations adopt MFA, such occurrences of credential theft and unauthorized access will remain further out of attackers’ reaches.