Thank you for Subscribing to Gov Business Review Weekly Brief
Thank you for Subscribing to Gov Business Review Weekly Brief
By
Gov Business Review | Monday, April 03, 2023
Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.
MFA is the next-level solution for cyberattacks in companies.
FREMONT, CA: There hasn't been a major cyberattack over the last five years where identity - generally an endangered password - was not the invasion vector. Password authentication alone cannot give total security in a technologically useful era. Passwords like phishing, brute force raids, and malware are usually endangered as shared details for cyberattacks.
A phishing attack is on the peek as it's a low-cost and useful form of attack. In reply to this epidemic of authentication-ground cyberattacks, governments globally are moving for multi-factor authentication (MFA) solutions that can control password-based attacks and better safeguard essential information and systems. Government organizations are following a policy that concentrates on doing.
But the dispute rests with multiple unequal MFA technologies closing. Some are favorably vulnerable, leaving them available for phishing, like one-time passwords. Though they are single-use verification, the rest shared details. Other solutions are not convenient or generate privacy problems.
Technologies must move beyond shared data techniques to design efficient and strong authentication. Based on the white paper by Chertoff Group, governments globally can obey the basic principles to handle and protect vital assets.
Have a plan that handles authentication.
A well-organized process must be obeyed to induce robust authentication for cyber risk governance. Cyber security that does not concentrate on robust authentication is not responsible.
Identify the security restrictions of shared riddles
Organizations must evaluate the risk of OTPs, and a transferred details approach and design an authentication method with a safer option, like public-key cryptography.
Do not specify any single technology or solution. Concentrate on measures and results.
Technologies are re-imagining daily. Governments must design an authentication method that will not avert appearing technologies.
Promote widespread acceptance by selecting authentication solutions that are comfortable to use
Bad usableness makes it difficult. Creative MFA solutions significantly lower user erosion by giving convenient security solutions.
Learn the traditional barriers to powerful authentication to use longer
Earlier MFA solutions were pricey, which precluded numerous companies from embracing the feature. Recently, MFA solutions have evolved to more dependable and safe elements at low costs.
Employ biometrics properly
Biometric solutions must be used on a single device to evade data violations. It works as one layer of a multi-factor verification solution.
Cyber risk cannot be eradicated, but appropriately executing new-age cybersecurity solutions can aid in reducing the security risk, saving an organization's time, money, details, and importance.
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info