How to Prevent Attacks that Bypass MFA
Originally aired: Thursday, December 15, 2022
What you'll learn:
- Evolving attacks tactics from on-the-field security researcher
- Best practices to strengthen authentication and prevent MFA bypass attacks
Implementing multi-factor authentication (MFA) is one of the most effective ways to reduce the risk of a data breach. The popularity of cloud-based services and mobile authenticators applications have made it easy for organizations to adopt MFA solutions, which makes it hard for cybercriminals to gain unauthorized access and has brought about an evolution in attack tactics. Tactics such as MFA Fatigue, a.k.a. prompt bombing, and Adversary-in-the-Middle (AiTM) phishing attacks are more targeted and sophisticated. Security professionals are calling for more secure authentication factors or phishing resistant factors where possible.
Watch our on-demand webinar to hear from Nick Biasini, Head of Outreach for Cisco Talos, and Ganesh Umapathy, Cisco Duo Product Marketing, on how attackers are bypassing MFA and what you can do to prevent them.