Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business Resilience

What Every Business Needs To Know About Multi-Factor Authentication

By Eder Ribeiro
Rendered coding

Steve Johnson via Unsplash

May 13, 2025

Multi-factor authentication (MFA) has become one of the most-recommended security must-haves. It’s now a cornerstone in most business’ cybersecurity strategies, offering an additional layer of protection beyond traditional passwords that are often weak, recycled across multiple apps, sites, or systems, and routinely compromised.

Yet, as MFA adoption has increased, so too have the sophistication of attacks designed to circumvent it. Threat actors are continually developing new methods to bypass these security measures, presenting major risks to the organizations it is designed to protect.

Our team witnesses the aftermath commercial cyberattacks leave in their wake nearly every day. It can take businesses countless hours and thousands — sometimes millions — of dollars to fully recover. Unfortunately, we are seeing a rise in claims from organizations that believed they were protected by MFA protocols, only to suffer a bypass attack. 

With that in mind, it’s important that businesses understand both the strengths and vulnerabilities of MFA in today’s cybersecurity landscape. 

MFA Is Great, but Not Perfect

MFA enhances security by requiring users to provide multiple forms of verification — such as PIN, one-time passcode delivered to a mobile device, or biometric data — before granting access. This approach significantly limits unauthorized access, but it is not invulnerable to the exploitations of threat actors.

One prevalent method attackers are employing is the “attacker-in-the-middle” (AitM) phishing attack. In these scenarios, threat actors set up fraudulent intermediary sites to intercept communications between the victim and the legitimate service. They deploy fake login pages that mirror the real ones, capturing both the user's credentials, session cookies and sometimes the user’s MFA tokens. Hackers even sell ready-to-use kits to enable these attacks, such as this one capable of bypassing two-factor authentication on Google, Microsoft and Yahoo accounts.

Another tactic gaining traction is MFA fatigue or MFA push bombing. Attackers bombard the target with repeated MFA push notifications, hoping to wear down the user into approving one of the requests out of frustration or confusion. This method targets the human-weakness element of security, which is ultimately the largest and least controllable attack surface for any organization. Fatigue attacks bank on the likelihood an overwhelmed user might inadvertently grant access. It’s a risk for every organization, regardless of size. 

Passkeys Make Progress, but With Limitations

In response to the vulnerabilities associated with traditional MFA methods, the industry has been exploring alternative authentication mechanisms. Passkeys, which leverage user biometric data for submitting encryption information that is often stored within the user’s device, have emerged as a promising solution. Companies like Microsoft, Google, and Apple are advocating for passkeys as a more secure and user-friendly alternative to passwords. They provide more sophisticated security, operating like a “lock and key.” A website provides the “lock” (public key), and the user has a the “private key” on their device. Using this “public-key cryptography,” passkeys aim to eliminate the risks associated with password reuse and phishing attacks.

Still, passkeys too are not without their challenges. The reliance on device-based credentials means that if a device is lost, stolen, or compromised, the passkeys stored on it could be at risk. Additionally, sophisticated attackers can employ advanced techniques, such as deepfake technology, to spoof biometric data. Transitioning to passkeys also requires widespread adoption across platforms and services, which is an ongoing process. 

Phish-Resistant MFA Solutions

Given the evolving threat landscape, phish-resistant MFA solutions are more imperative. These methods are designed to withstand phishing attacks by connecting authentication to specific devices and ensuring that credentials cannot be easily intercepted or replicated. Some configurations of passkeys can land in this territory.

One effective approach is the use of hardware security keys that comply with standards like FIDO2. These keys perform cryptographic operations that are bound to the user’s encryption key device, making it incredibly difficult for attackers to execute AitM attacks or duplicate authentication tokens. Using hardware security keys that require physical possession adds a tangible layer of security not easily skirted by remote attackers.

A Multi-Layered Defense Strategy

While implementing robust, phish-resistant MFA is crucial, it should be just one part of a multi-layered cybersecurity strategy. At a minimum, a more holistic approach should include:

  • Incident response planning: Establishing and regularly updating an incident response plan is instrumental in helping organizations respond effectively in high-stress situations and minimize potential damage.
  • Continuous user education: Regular training programs to educate employees about new phishing techniques and social engineering tactics — and how to recognize them — to reduce the likelihood of successful attacks.
  • Advanced threat detection: Sophisticated monitoring tools can detect strange behavior and potential intrusions in real-time, so organization can respond swiftly to emerging threats.
  • Regular security assessments: Frequent security audits and penetration testing helps identify and remedy vulnerabilities before they can be exploited by bad actors.

MFA remains a critical component of cybersecurity, but it’s not a cure-all. A resilient approach to cybersecurity requires understanding the limitations of each strategy, and implementing a multi-layered, adaptive security posture. This approach goes a long way towards safeguarding your business in a risky digital world.

KEYWORDS: cybersecurity strategies multi-factor authentication organizational resilience

Share This Story

Eder ribeiro headshot

Eder Ribeiro is Director of Global Incident Response at TransUnion. Image courtesy of Ribeiro

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!