Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Multi Factor Authentication – The Low Hanging Fruit
Cybersecurity

Multi Factor Authentication – The Low Hanging Fruit

Analyst Column: Security as an Enabler
Chris HughesBy Chris HughesOctober 1, 2021Updated:December 7, 20214 Mins Read
Facebook Twitter LinkedIn Email
Multi-Factor Authentication
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Due to the COVID-19 pandemic, 2019 and 2020 saw businesses increasingly shift to a remote workforce. As part of that shift, organizations increasingly exposed business systems externally and adopted Software-as-a-Service (SaaS). These subscription-based services and externally accessible business applications facilitate their business continuity and operations. However, this also presents risks. Because of added risk factors, industries saw a greater need for multi-factor authentication.

Protecting Critical Business Information

These SaaS environments often store critical business information. From customer relationship management, they stored sensitive data. For instance, this may include personally identifiable information (PII) and even organizational intellectual property (IP).

Many organizations simply utilize usernames and passwords. Usernames and passwords aren’t sufficient from a security perspective. Hackers can easily guess and often expose these credentials. Individuals can also check if their credentials have been compromised through popular websites where you enter email addresses. They can check if they have been involved in a data breach.

Malicious actors often expose these during hacks and data breaches. These threats allow hackers to use them to compromise other accounts. This isn’t uncommon, since many individuals re-use credentials from one environment to another. For example, you have your personal email or social media account credentials. Then, you might re-use those credentials, such as for your business accounts and environments. Malicious actors are able to combine guessing usernames and passwords to pivot from personal accounts to business accounts.

Implementing Multi-Factor Authentication

There are a lot of options to secure externally exposed business applications or SaaS environments. One of the easiest to implement and biggest value-added is Multi-Factor Authentication (MFA). MFA is essentially adding another layer of security to your login process. Instead of only providing a username and password, you can now require users to also provide a second factor of authentication. For example, you can require a code delivered via SMS to your cell phone. You can also take it a step further by utilizing applications, such as Google Authenticator, to generate one-time passwords.

Implementing MFA forces malicious actors to need more than just present credentials, such as usernames and passwords. It also requires them to provide codes delivered via SMS text or one-time passwords delivered to applications. This exponentially increases the difficulty for malicious actors looking to gain unauthorized access to your sensitive information.

Leaders in the MFA space point out that implementing MFA has the benefits of enabling stronger authentication. Additionally, it adapts to the remote workforce. It does so without compromising the user experience.

SMS Attacks

Despite the merits discussed above, MFA isn’t without its own concerns, particularly SMS. For example, many utilize SMS text for MFA. However, it can be compromised by SMS attacks. This includes compromising phones, phone numbers, or even messaging centers.

If these attacks are successful, the SMS text sent to your mobile device as part of the MFA process can be exposed or intercepted by malicious actors. It can be utilized and paired with your compromised usernames and passwords to ultimately access your business accounts. Even organizations, such as the U.S. National Institute of Standards and Technology (NIST), have dismissed the use of SMS messages with one-time passwords as a secure MFA measure.

Secure Methods of Multi-Factor Authentication

Utilizing a one-time password application, such as Google Authenticator or Duo, is a more secure MFA method than SMS text messaging. This is due to the potential attacks mentioned above. While malicious actors can also capture one-time passwords (OTP), the method is much more unlikely than the compromising of SMS messaging.

Final Thoughts

As organizations increasingly move to support the remote workforce, exposure to internal business applications will grow. This especially pertains to when it couples with increased adoption of cloud-based systems and SaaS. With this growth, organizations will continue to expose sensitive data. This continuation will typically be through cloud-based storage or by granting external access to their environments as part of SaaS subscriptions.

This reality warrants increased security measures. These measures safeguard both organizational and customer data from malicious actors. Businesses should adopt MFA. Furthermore, they should particularly consider software-based OTP’s to mitigate this risk, secure their business data, brand and avoid potential blowback, both from a regulatory and customer perspective.

Cybersecurity Cybersecurity channel featured Security as an Enabler
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Microsoft Makes Major Push Into AI Agent Interoperability with New MCP Rollouts

May 23, 2025

Microsoft’s Latest Release Announcements Aimed at Streamlining Agentic AI, Increasing Accessibility

May 23, 2025

Microsoft and OpenAI Could Revise Partnership Terms Ahead of Potential OpenAI IPO

May 23, 2025

IBM Research Sheds New Light on AI Agents’ Impact Across Org Structures, Business Functions

May 22, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft Makes Major Push Into AI Agent Interoperability with New MCP Rollouts
  • Microsoft’s Latest Release Announcements Aimed at Streamlining Agentic AI, Increasing Accessibility
  • Microsoft and OpenAI Could Revise Partnership Terms Ahead of Potential OpenAI IPO
  • IBM Research Sheds New Light on AI Agents’ Impact Across Org Structures, Business Functions
  • SAP Says Reports of Applications’ Death Are Greatly Exaggerated!

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.