THANK YOU FOR SUBSCRIBING
Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Gov CIO Outlook
THANK YOU FOR SUBSCRIBING
By
Government CIO Outlook | Friday, June 24, 2022
Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.
MFA is the next-generation solution for cyberattacks in organizations.
FREMONT, CA: There hasn't been a major cyberattack over the last five years where identity - typically a compromised password - was not the vector of attack. Password authentication alone cannot provide complete security in a technologically sound era. Passwords are often compromised as shared information for cyberattacks such as phishing, brute force attacks, and malware.
A phishing attack is on the rise as its low cost and most effective form of attack. In response to this epidemic of authentication-based cyberattacks, governments worldwide are pushing for multi-factor authentication (MFA) solutions that can prevent password-based attacks and better protect critical data and systems. Government organizations are pursuing a policy that focuses on doing.
But the challenge remains with numerous unequal MFA technologies approaching. Some are highly vulnerable, leaving them open to phishing such as one-time passwords. Although they are single-use authentication, they remain shared information. Other solutions are not user-friendly or cause privacy concerns.
To develop efficient and robust authentication technologies have to shift beyond shared data methods. As per the white paper produced by Chertoff Group, governments worldwide can follow the fundamental principles to manage and protect critical assets.
Have a plan that explicitly addresses authentication
A well-structured process must be followed for cyber risk management to generate a strong authentication. Cyber security that does not focus on strong authentication is not trustworthy.
Recognize the security limitations of shared secrets
Organizations must consider the risk involved with OTPs, which is a shared information process, and develop an authentication process that has a more secured option, such as public-key cryptography.
Do not prescribe any single technology or solution-focus on standards and outcomes.
Technologies are reinventing every day. Governments must develop such an authentication process, which will not prevent emerging technologies.
Encourage widespread adoption by choosing authentication solutions that are easy to use
Bad usability creates difficulty. Innovative MFA solutions drastically reduce user abrasion by providing user-friendly security solutions.
Understand the old barriers to strong authentication to apply longer
Previous MFA solutions were expensive, which prevented many companies from adopting the feature. In recent years MFA solutions have come up with more reliable and secured features at low expenses.
Use biometrics appropriately
Biometric solutions must be applied to a single device to avoid any data breach. It acts as one layer of a multi-factor authentication solution.
Cyber-risk cannot be eliminated, but proper implementation of new-age cybersecurity solutions can help minimize the security risk, thus saving an organization's time, money, information, and reputation.
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info