Get the inside scoop with LoginTC and learn about relevant security news and insights.

MFA Assessments Unpacked: An Introduction

March 08, 2023Victoria Savage

Does your organization use multi-factor authentication?

It seems like a straightforward question. You’ve likely had to answer a few dozen questions like it in the past few years. Between cyber insurance questionnaires, vendor applications, auditing checklists, and more, the demand and scrutiny on IT departments has grown.

But what does the question really mean, and how do you know if you’re answering it correctly?

At LoginTC, we’re firm believers in the idea that improving our awareness and understanding of MFA, as well as making it more approachable for non-technical users, is the only way to bring about wider adoption of MFA as a standard cybersecurity control.

At the same time, there is a danger that when we ask simple questions, we get simple answers. They leave the door open for ambiguity and don’t always paint a full picture of your organization’s cybersecurity landscape.

The fact is, “does your organization use multi-factor authentication” is one of those simple questions.

There are too many ways to answer that question and interpret that answer. For example, what if you use MFA on your remote desktop services, but not to access your email client? Or, what if your privileged accounts use MFA to log in to the company VPN, but your third-party contractors are exempt? Or what if you aren’t exactly sure about any of your MFA protocols?

Not knowing the answers to these MFA questions can have far-reaching consequences, especially when filling out cyber insurance applications or vendor attestations.

This doesn’t have to be a source of concern. There are ways to paint that full picture of your MFA implementation, not only for your next cyber insurance application or vendor assessment, but so you can better gauge your organization’s cybersecurity posture for yourself.

Our new MFA Assessments series

That’s why we’re launching a new informational series, MFA Assessments Unpacked.

In this 5-part series, we’ll explore:

  1. What is an MFA assessment and why should you do one?
  2. Preparing for your MFA assessment
  3. Conducting your MFA assessment
  4. Finishing your MFA assessment
  5. Deploying an efficient MFA assessment process

At the end of this series, we’ll be introducing a new tool that will be available for free to organizations anywhere that want to get a better understanding of their MFA implementation.

After exploring this series, we hope you’ll be able to assess and understand your MFA protocols and confidently fulfill whatever requirements you need to meet to get compliant.

Read the first installment of our MFA Assessments Series.

Start your free trial today. No credit card required.

Sign up and Go