Page 44 - Cyber Defense eMagazine January 2023
P. 44
Every type of MFA can amplify safety if compounded with contextual triggers, such as:
• Programs verifying IP address or connection
• Geolocation
• Checking the assigned device against permissions
• Time-checking
4. Reinforce with Complementary Solutions
Combining MFA with other cybersecurity methods will only make defenses more robust. Two techniques
that bolster protection are single-sign on and least-privilege infrastructure.
Single sign-on (SSO) could be risky if misused, but sound practices could reduce password reuse or
sloppy password management because staff members only have one set of credentials. SSO isn’t the
best defense because one password and username would be all a hacker would need. However, with
MFA, it works on multiple fronts. Least privilege works even more synergetically with these methods to
prevent unnecessary credentials from accessing information they don’t need to complete their tasks.
5. Schedule Evaluations Implementing Change Management
Make technical teams continue to oversee how their infrastructure operates. Several times a year,
employees should gather data about their experience with MFA and if they feel it protects their assets in
a streamlined way. Here are some concerns employees may raise about their MFA experience:
• The app stack is too cumbersome or not user-friendly
• They prefer other forms of MFA
• Reports of inconsistent authentication receipts
• Notices of infrequent updates
If an IT team finds improvements, they can install them with a change management structure, which
forces teams to delegate changes to specific parties and make thorough documentation of those
changes. Notating who and when changes happened will provide insight for anyone new making
adjustments — it will help if they encounter roadblocks and need to collaborate with other team members
to overcome obstacles.
Why MFA Is Essential for Security
Committing to a solid defensive security strategy enables analysts and other employees to use
technology more safely. Businesses can allocate energy and resources to strengthen different facets of
Cyber Defense eMagazine – January 2023 Edition 44
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.