Multi Factor Authentication
Attackers are reaching a new level of sophistication well beyond what passwords and even MFA can handle alone. This is because the attacks target the access control and identity provisioning layers to bypass protections that surround company data and accounts. When an attacker can leverage a password, account profile reset, or MFA prompt for malicious purposes, the company’s protective layer falls away. This means that technologies like fingerprinting and account takeover monitoring are more important than they have ever been.
Passwords
It is especially fitting that we collectively discuss the use of passwords in light of recent breaches this quarter that have resulted in terabytes of stolen proprietary data and untold financial cost. The simplest of defences in our toolbelt, credential and identity management, can be the difference between a secure system or an unimaginable incident.
Most of the breaches we hear about in the news are a result of businesses relying on automated access control and realising too late when a user has been hijacked. Once an account is compromised, identity-based fraud can be extremely difficult to detect considering the advanced tactics and randomness of different crime groups like LAPUS$ and Conti.
To succeed against dynamic cybercriminals and account takeover (ATO) attacks, organisations must build robust identity management systems and invest resources into building a learning system that evolves to identify anomalous user activity. These techniques can ebb and flow with the sophisticated threat landscape we’re witnessing today.