When and why to use Multi-Factor Authentication | Primary Technology (2024)

What is multi-factor authentication?

Multi-factor authentication (MFA) makes your data harder to steal by cybercriminals. It only allows access to a service when you present two or more forms of authentication, reducing the possibility of an attacker compromising an account.

Two-factor authentication (2FA) uses two-factors of authentication. 2FA is a sub-set of MFA and is the most common method of implementing multiple factors of authentication.

Who should use MFA?

The National Cyber Security Centre (NCSC) recommends that all organisations should use MFA for any Cloud or Internet-connected services.

The Department for Education recommend that where practical, you must enable multi-factor authentication. This should always include cloud services and all staff are strongly encouraged to use multi-factor authentication.

We would recommend MFA across all accounts. All cloud services should be implemented with MFA and where feasible, all accounts that can be implemented with MFA, should be.

How does MFA work?

Most people have already used MFA in some form, it works by requiring additional verification (factors) to gain access to a resource. Consumer banks started using card readers over a decade ago, which was one of the earliest forms of MFA for consumers. When making payments you would be required to use your debit/credit card with the card reader, to provide the additional layer of security. These days you will recognise MFA in the form of an Authenticator app on your mobile device, or getting a text message when trying to login to an online website.

What are the multi factors of MFA?

The multiple factors of MFA can include:

  • Something you know (knowledge), such as a password or PIN
  • Something you have (possession), an application on a user’s trusted device such as Microsoft’s Authenticator App, available on all smartphones or physical authentication token usually a small USB key, such as a device like YubiKey
  • Something you are (inheritance), a biometric test such as fingerprint or facial recognition on a smartphone app

Does MFA make it harder for the users?

Adding an extra step to any process will generally take some additional time. However, many services have a feature to “remember my device” which means the additional factor is not required again if the user always uses the same device.

Some additional factors like apps and tokens will require a little extra work, but we find that most users enjoy knowing they are reducing their risk of data loss.

How secure is MFA?

Adding MFA to your accounts reduces risk substantially. There is still a small risk that cybercriminals can target users with phishing and social engineering, leading to users approving a hacker’s MFA request. For this reason, we’d recommend your internal training on cyber security covers the topic of email security and password security.

An additional method to bypass MFA involves a hacker attempting to gain control of a user’s SIM card to approve an MFA request. This is uncommon in most scenarios but is still a weak point of SMS-based MFA.

How soon should you implement MFA?

We would recommend MFA is implemented as soon as possible, especially for all cloud services.

How can we help?

As an IT services provider, we implement and support organisations when setting up MFA. We also carry out audits to ensure accounts are being managed correctly and that MFA is implemented where possible. You can contact us to find out more.

Share this post

When and why to use Multi-Factor Authentication | Primary Technology (2024)
Top Articles
17 CFR § 255.3 - Prohibition on proprietary trading.
Data provides insights on broking industry
Skamania Lodge Groupon
Canary im Test: Ein All-in-One Überwachungssystem? - HouseControllers
Goodbye Horses: The Many Lives of Q Lazzarus
Manhattan Prep Lsat Forum
Toyota Campers For Sale Craigslist
Soap2Day Autoplay
Vaya Timeclock
Dr Doe's Chemistry Quiz Answer Key
Samsung 9C8
How to Type German letters ä, ö, ü and the ß on your Keyboard
Nwi Police Blotter
Evita Role Wsj Crossword Clue
My Vidant Chart
Rls Elizabeth Nj
Sotyktu Pronounce
De Leerling Watch Online
Diablo 3 Metascore
Bjork & Zhulkie Funeral Home Obituaries
Nitti Sanitation Holiday Schedule
finaint.com
Buy PoE 2 Chaos Orbs - Cheap Orbs For Sale | Epiccarry
Dutch Bros San Angelo Tx
Hellraiser III [1996] [R] - 5.8.6 | Parents' Guide & Review | Kids-In-Mind.com
Where to Find Scavs in Customs in Escape from Tarkov
Ms Rabbit 305
10 Fun Things to Do in Elk Grove, CA | Explore Elk Grove
How To Level Up Roc Rlcraft
Hdmovie 2
Weve Got You Surrounded Meme
Ihub Fnma Message Board
Surplus property Definition: 397 Samples | Law Insider
Tracking every 2024 Trade Deadline deal
Rs3 Bring Leela To The Tomb
Vlacs Maestro Login
Package Store Open Near Me Open Now
Account Now Login In
Fbsm Greenville Sc
Average weekly earnings in Great Britain
Tmj4 Weather Milwaukee
Orangetheory Northville Michigan
Crystal Mcbooty
Studentvue Columbia Heights
Enjoy4Fun Uno
How are you feeling? Vocabulary & expressions to answer this common question!
Labyrinth enchantment | PoE Wiki
Hindilinks4U Bollywood Action Movies
World Social Protection Report 2024-26: Universal social protection for climate action and a just transition
Reese Witherspoon Wiki
Dickdrainersx Jessica Marie
Holzer Athena Portal
Latest Posts
Article information

Author: Ray Christiansen

Last Updated:

Views: 6373

Rating: 4.9 / 5 (49 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Ray Christiansen

Birthday: 1998-05-04

Address: Apt. 814 34339 Sauer Islands, Hirtheville, GA 02446-8771

Phone: +337636892828

Job: Lead Hospitality Designer

Hobby: Urban exploration, Tai chi, Lockpicking, Fashion, Gunsmithing, Pottery, Geocaching

Introduction: My name is Ray Christiansen, I am a fair, good, cute, gentle, vast, glamorous, excited person who loves writing and wants to share my knowledge and understanding with you.