Multi-Factor Authentication (MFA), as part of an identity and access management (IAM) solution, can help prevent some of the most common and successful types of cyberattacks, including:
To understand how MFA helps prevent security breaches, let’s first review how these types of cyberattacks work:
How it works: The attacker uses a list of phone numbers or email addresses and delivers a message with a compelling call to action. (For example, the user may be told that he or she needs to log in and verify transactions.) Usually, it sends users to a fake website where the users provide their username and password.
How it works: The attacker targets a small group of individuals with well-crafted, believable messages that are relevant to the target group, often using personalized content (such as the user’s name or a recent user action or event). Like phishing, it uses calls to action that get users to provide their credentials.
How it works: The attacker installs a program (often via a virus) that captures every keystroke on the user’s computer, including sites visited, usernames, passwords, answers to security questions, and more.
How it works: The attacker takes advantage of the fact that users often use the same username and password on multiple accounts by attempting to use stolen credential pairs to gain access to many different sites and apps.
How it works: The attacker uses a program to generate possible usernames/passwords and to try and gain access with them. (Dictionary attacks are a type of brute force attack.) Or the attacker tries the most commonly used passwords (like Password123) on many different accounts.
How it works: The attacker’s program inserts itself into the interaction between a user and an app (for instance, by impersonating a public Wi-Fi). The program then gathers the login credentials that the user enters—or even hijacks the session token.
Multi-Factor Authentication works to thwart cybercriminals by requiring additional information or credentials from the user. A phishing attack may garner a user’s credentials, but it won’t provide the hacker with a fingerprint, for instance, or the answer to a personal security question.
Similarly, a brute force or reverse brute force attack may manage to find a working username and password, but the attacker doesn’t know what other authentication factors the MFA system requires and doesn’t have those credentials.
Similarly, MFA can combat more sophisticated attacks, such as MITM, by adding an extra layer of security. Even if the hacker or program inserts itself and captures the information that the user enters, the IT administrator can set up MFA to require that the user supply credentials from a different device or channel. Push-based authenticators are extremely well suited to provide a secure mechanism with minimal user inconvenience.
For example, let’s say that the user is logging in from her laptop, which has been compromised by a MITM program. But the business has set up MFA and, to complete her login, the user must use a phone app, such as OneLogin Protect. The native mobile authenticator app sends a code from the phone to the authentication system to complete the login. Since the MITM hacker doesn’t have access to the user’s phone, the breach is prevented.
MFA and IAM don’t stop all types of attacks, and it doesn’t guarantee security. But it does add additional layers of authentication that make cyberattacks more difficult.
OneLogin’s MFA solution helps protect against unauthorized access to critical corporate data.Learn More
Learn six of the most common password attacks and how you can protect against them.Read More
Find out what cybersecurity actually means and how you can implement cybersecurity plans in your business.Read More
Take the Cyberattack Quiz and learn how informed you are about cybersecurity.Read More
Learn how to protect your most valuable information by securing apps with MFA.Learn More
Find out how security leaders are using artificial intelligence and machine learning to fight cyberattacks with context-aware risk analysis.Learn More