Multi-factor authentication (MFA) is – according to Australian cybersecurity authorities – “one of the most effective controls an organisation can implement to prevent an adversary from gaining access to a device or network and accessing sensitive information”.
“When implemented correctly, MFA can make it significantly more difficult for an adversary to steal legitimate credentials to facilitate further malicious activities on a network,” the Australian Cyber Security Centre (ACSC) says. “Due to its effectiveness, multi-factor authentication is one of the Essential Eight from the Strategies to Mitigate Cyber Security Incidents.”
MFA’s deployment is also aligned to CIS 18 – which means two of Australia’s most popular security frameworks both recommend applying this type of protection to user accounts.
Despite this, the actual use of MFA is not yet at its desired level.
A recent survey showed that only 37% of businesses “have a requirement for their people to use two-factor authentication when accessing their network, or for applications they use.”
Frustration at the lack of movement on MFA is, at times, palpable; according to one global survey in mid-2020, 29% of respondents saw their “inability to institute MFA as the biggest threat to their company.”
A post by Microsoft’s Director of Identity Security Alex Weinert late last month encapsulates the threat perfectly: “When we look at hacked accounts, more than 99.9% don’t have MFA, making them vulnerable to password spray, phishing, and password reuse,” Weinert wrote.
This should be a wake-up call for all organisations. An organisation without MFA is putting itself, its accounts, and the permissions and data that sits behind those logins, at considerable risk of compromise.