Multi-Factor Authentication (MFA) – Required, Not Optional

[social_warfare]

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA) is a tool that requires 2 or more confirmations from a user before access is granted.  MFA is strongest when deployed in a multiple device method.  For example, logging into your bank account should require a username and a strong password, at which time you receive an email with a code, the bank website will not proceed until the correct code (usually 6 digits) is input.  An even stronger method would utilize a cell phone to deliver the code; requiring a bad actor to have gained access to multiple means in order to access your sensitive data.

Private Communication

By the latter half of WWII, code-breaking geniuses had been identified and brought in on all sides.  Communication in that era depended on radio transmissions.  Radio waves were very easy to intercept and still are to this day.  This forced the different sides to utilize codes to communicate among troops.  Many code languages were crafted only to be deciphered by the enemy making those deciphered messages quite deadly for the sender and receiver(s).  Machines were invented to make the code languages more difficult to decipher, but capturing machines was accomplished and greatly increased the speed by which the opposing side was able to decipher encrypted messages.  As we entered into the Pacific Theatre, the US Marines brought in Navajo Code Talkers; placing one Navajo Code Talker in each unit allowed our troops to be able to communicate securely with Command and their fellow units.  Due to the tonal nature of the Navajo language and how tone change could indicate an entirely different word; enemy forces were unable to decode the communications, and by the end of WWII their code language was never broken or decrypted.  The Navajo Code Talkers were critical to the success at Iwo Jima and across the Pacific Theatre.

Every Growing & Changing

Currently, we find ourselves in a similar position; although our enemy wishes to steal, to destroy through our internet connection.  The very connection that has become necessary to maintain the levels of productivity that we all have come to rely on.  Similar to what the Marines faced in the 1940’s; our transmissions over that internet connection are very easy to intercept.  Further, our machines are common and easily available for malicious actors to study and find weaknesses in.  Unlike the Marines, we now have software running our machines, but that too is easily accessible to bad actors for testing and teaching themselves how to break and manipulate the tools we use to work against us.  So, now we are faced with a need and a dependence upon this very connection that seems to be a primary threat vector.  How do we protect ourselves, our business, and our clients in the face of such a predicament?  We can follow the lead of our forefathers and require additional steps to ensure that our communications are only originating from ourselves or our staff.

Now More Than Ever

In light of ongoing conflict around the world; Insurance companies have accelerated new requirements for critical industries and businesses.  Transportation, Healthcare, Commercial facilities, Financial Services are just some of the industries with heightened requirements.  Insurance rates and premiums are being highly affected by a business’s Cybersecurity stance and preparedness, and in some cases failing to have adequate Cybersecurity in place can prevent an insurance renewal outright.  While these services are a net new cost, it is a nominal fee when compared to the giant increases to premiums and a fraction of the cost of remediating an attack or compromise.  MFA forces the human to be the center of the security, not a fallible machine by requiring confirmation of identity through multiple means.

What Now?

If you have any questions or would like to set up MFA and other necessary security means for your business, call us at 855-983-7325 to speak with one of our experts. Or submit your request below and receive our CyberSecurity Infograph and a follow up from one of our experts.

 

Written By: Adam Coker

Published By: Jessica Anthony

Cyber Security Review

Name(Required)

Would you like us to reach out to schedule your review?(Required)

Posted in , ,

Categories

Jessica Anthony

Leave a Comment