Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business Resilience

Better Together: How MFA and Strong Password Practices Can Help Bolster Security

By Darren James
Glowing puzzle piece

Edge2Edge Media via Unsplash

May 30, 2025

It is commonly known that relying solely on a username and password is insufficient to safeguard an account from cyber-attacks. Without a secondary layer of protection, there’s an increased risk of account takeover and compromise. For organizations, this could mean that sensitive company data is at risk of being exfiltrated, systems are at risk of being infected with malware, and stolen credentials could be used to launch attacks on other systems.

The consequences of a cyberattack can be devastating for an organization’s reputation, finances, and customers. To combat this, many organizations use multi-factor authentication (MFA) to add an extra layer of protection to accounts. However, as threats become more sophisticated, cybercriminals are finding ways to get around previously robust MFA measures with increasing ease. This poses the question: is MFA enough to protect against modern threats?

MFA Compromise: Understanding the ‘How’

First, security teams must understand techniques used by cybercriminals to exploit users in MFA attacks and the potential consequences for their organization. Human errors frequently play a role in making MFA attacks possible. For example, MFA fatigue attack (or prompt bombing) is when an attacker floods a user with multiple MFA prompts, causing the user to approve a login request to stop the notifications. These types of attacks play on the frustration of getting bombarded with messages.

MFA attacks are also happening in high-profile hacks as well. In recent years, cybercriminals have exploited helpdesks through social engineering support staff into bypassing MFA requirements or resetting user credentials. These cybercriminals rely on the empathy of helpdesk staff by impersonating distressed employees. This happened in the case of the 2023 MGM hack, which cost the organization around $100 million. This incident highlights how human error is often found at the center of MFA-related attacks. It also shows that users should not only use MFA to keep hackers away. Human error can undermine the effectiveness of even the most stringent password policies and MFA measures.

Similarly, cybercriminals sometimes target vulnerabilities and privileged accounts to gain access to a system. Cybercriminals have been known to exploit vulnerabilities in web session management, performing session hijacking. They acquire a legitimate user's session ID, a token used for authentication, allowing them to impersonate the user and control their active session. Additionally, some hackers have bypassed MFA by exploiting Single Sign-On (SSO) systems, which allows hackers to access multiple services through a single account. This can be done through the session hijacking.

With both tech and humans exploited in MFA related attacks, is it still worth using MFA? The short answer: yes. 

Should My Organization Still Use MFA?

MFA remains an important security measure for organizations and should not be neglected. It provides organizations with a back-up defense against poor passwords and weak logins.

Critically, MFA adds a necessary layer of security that mitigates excess risk, like phishing and stolen credentials being used to access an account easily. Ultimately, MFA makes it harder for attackers to successfully access an account, even though it can be exploited. For some hackers, the amount of effort needed to exploit MFA is enough to abandon efforts altogether, although MFA should not be relied upon to stop this. 

In some cases, MFA is also essential for compliance. Many industries have strict data security regulations that can be met by employing MFA, helping organizations avoid potential fines and legal issues. For example, PCI DSS mandates MFA for admin access to cardholder data environments, protecting sensitive payment card information from being compromised. Similarly, HIPAA requires healthcare organizations to implement access controls to safeguard ‘Protected Health Information’ (PHI), which can be met by employing MFA measures.  

Layering Security: Back to Basic Password Security

Although MFA is beneficial for password security, the significance of implementing basic password policies cannot be emphasized enough. Since many systems rely on passwords, ensuring strong password policies is crucial for maintaining overall security. In the case of MFA, typically passwords are required to initiate the MFA process. Making passwords harder to guess reduces the risk of a hacker successfully getting to the point of needing to bypass MFA. As a result, organizations should not rely solely on a passwordless factor like a pin or biometric factor.

Organizations should educate users on the importance of strong passwords and good password hygiene. Users should be taught that MFA is not infallible and should not be relied upon to keep an account secure. Good passwords make it harder to access an account in the first place. Education is one way to build a strong, company wide security culture. A strong security culture emphasizes the significance of protecting crucial information, as employees recognize the worth of data and comply with recommended methods.

Similarly, organizations should put in place a robust recovery procedure in case MFA is lost. MFA failures can include users losing their phones or having an MFA device compromised. Strong passwords can work here as a backup to regain account access. Ultimately, layered security is key, with no one layer held solely accountable for protecting an account entirely. 

Passwords and MFA: Working Together

MFA is undeniably a critical component of a strong security strategy. However, it should not be relied upon heavily to stop cybersecurity incidents. By fostering a strong security culture through education and policies, users can understand the importance of layered security. Ultimately, passwords and MFA work in tandem to provide a robust defense. If one layer fails, the other can still provide protection. A strong security strategy should be multi-layered and not put the onus on humans or tech entirely. 

KEYWORDS: multi-factor authentication password password security

Share This Story

Darren james headshot

Darren James is a Senior Product Manager at Specops Software, an Outpost24 company. Darren is a seasoned cybersecurity professional with more than 20 years of experience in the IT industry. He has worked as a consultant across various organizations and sectors, including central and local governments, retail and energy. His areas of specialization include identity and access management, Active Directory, and Azure AD. Image courtesy of James

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!