Page 44 - Cyber Defense eMagazine January 2023
P. 44

Every type of MFA can amplify safety if compounded with contextual triggers, such as:

               •  Programs verifying IP address or connection
               •  Geolocation
               •  Checking the assigned device against permissions
               •  Time-checking



            4. Reinforce with Complementary Solutions

            Combining MFA with other cybersecurity methods will only make defenses more robust. Two techniques
            that bolster protection are single-sign on and least-privilege infrastructure.

            Single sign-on (SSO) could be risky if misused, but sound practices could reduce password reuse or
            sloppy password management because staff members only have one set of credentials. SSO isn’t the
            best defense because one password and username would be all a hacker would need. However, with
            MFA, it works on multiple fronts. Least privilege works even more synergetically with these methods to
            prevent unnecessary credentials from accessing information they don’t need to complete their tasks.




            5. Schedule Evaluations Implementing Change Management
            Make  technical  teams  continue  to  oversee  how  their  infrastructure  operates.  Several  times  a  year,
            employees should gather data about their experience with MFA and if they feel it protects their assets in
            a streamlined way. Here are some concerns employees may raise about their MFA experience:

               •  The app stack is too cumbersome or not user-friendly
               •  They prefer other forms of MFA
               •  Reports of inconsistent authentication receipts
               •  Notices of infrequent updates



            If an IT team finds improvements, they can install them with a change management structure, which
            forces  teams  to  delegate  changes  to  specific  parties  and  make  thorough  documentation  of  those
            changes.  Notating  who  and  when  changes  happened  will  provide  insight  for  anyone  new  making
            adjustments — it will help if they encounter roadblocks and need to collaborate with other team members
            to overcome obstacles.




            Why MFA Is Essential for Security

            Committing  to  a  solid  defensive  security  strategy  enables  analysts  and  other  employees  to  use
            technology more safely. Businesses can allocate energy and resources to strengthen different facets of






            Cyber Defense eMagazine – January 2023 Edition                                                                                                                                                                                                       44
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   39   40   41   42   43   44   45   46   47   48   49