Get the inside scoop with LoginTC and learn about relevant security news and insights.
March 08, 2023 •
Does your organization use multi-factor authentication?
It seems like a straightforward question. You’ve likely had to answer a few dozen questions like it in the past few years. Between cyber insurance questionnaires, vendor applications, auditing checklists, and more, the demand and scrutiny on IT departments has grown.
But what does the question really mean, and how do you know if you’re answering it correctly?
At LoginTC, we’re firm believers in the idea that improving our awareness and understanding of MFA, as well as making it more approachable for non-technical users, is the only way to bring about wider adoption of MFA as a standard cybersecurity control.
At the same time, there is a danger that when we ask simple questions, we get simple answers. They leave the door open for ambiguity and don’t always paint a full picture of your organization’s cybersecurity landscape.
The fact is, “does your organization use multi-factor authentication” is one of those simple questions.
There are too many ways to answer that question and interpret that answer. For example, what if you use MFA on your remote desktop services, but not to access your email client? Or, what if your privileged accounts use MFA to log in to the company VPN, but your third-party contractors are exempt? Or what if you aren’t exactly sure about any of your MFA protocols?
Not knowing the answers to these MFA questions can have far-reaching consequences, especially when filling out cyber insurance applications or vendor attestations.
This doesn’t have to be a source of concern. There are ways to paint that full picture of your MFA implementation, not only for your next cyber insurance application or vendor assessment, but so you can better gauge your organization’s cybersecurity posture for yourself.
That’s why we’re launching a new informational series, MFA Assessments Unpacked.
In this 5-part series, we’ll explore:
At the end of this series, we’ll be introducing a new tool that will be available for free to organizations anywhere that want to get a better understanding of their MFA implementation.
After exploring this series, we hope you’ll be able to assess and understand your MFA protocols and confidently fulfill whatever requirements you need to meet to get compliant.
Keep an eye on our blog for the first installment of this series, and subscribe to our newsletter to get updates directly to your inbox.