Category: Authentication Methods and Technologies

Air-Gapped MFA

Security for environments with no internet access. Unlike standard MFA, this relies on offline methods like QR codes or hardware tokens to verify identity.

Biometric Authentication

Utilizing unique biological traits such as fingerprints or facial recognition to grant access to systems and applications.

FIDO2 / WebAuthn

The modern standard for phishing-resistant authentication. It uses public-key cryptography to eliminate the risk of credential theft.

Grid Card (Passcode Grid)

A cost-effective MFA method where users are challenged to provide characters from specific coordinates on a grid.

Multi-Factor Authentication (MFA)

Multi-factor authentication (MFA) is a method of identity verification where users are asked to prove two or more identity factors before gaining access to a digital system or application. Identity factors are considered to be:

  1. Something you know (like a password)
  2. Something you have (like a phone)
  3. Something you are (like a fingerprint)

By combining more than one identity factor, user accounts are more secure and less susceptible to cyber attacks such as password spraying, brute forcing, and even phishing.

Push Authentication

A user-friendly method where a login attempt triggers a notification on the user’s smartphone, requiring a simple “Approve” or “Deny.”

Push Number Matching

An enhanced version of push authentication where the user must enter a number displayed on the login screen into their app to prevent “MFA fatigue” attacks.

TOTP (Time-based One-Time Password)

A dynamic 6-digit code that changes every 30-60 seconds, generated by an authenticator app or hardware fob.

Category: Cyber Attacks and Threat Vectors

Adversary-in-the-Middle (AitM)

A high-level attack where a proxy server intercepts a login session in real-time, allowing hackers to bypass traditional MFA by stealing session tokens.

Brute-Force Attack

A trial-and-error method used by attackers to guess passwords or pins by systematically trying every possible combination.

Credential Stuffing

An automated attack where lists of leaked usernames and passwords are “stuffed” into other websites to gain unauthorized access.

MFA Fatigue (Push Spamming)

A social engineering tactic where an attacker sends a flood of push notifications to a user’s device, hoping the user will click “Approve” just to silence the alerts.

Phishing

Deceptive communications (emails, SMS, or sites) designed to trick users into surrendering their credentials or secondary authentication factors.

Category: Compliance, Audits and Regulatory Standards

APRA CPS 234

An Australian standard requiring financial institutions to maintain information security capabilities proportionate to their threats.

Cyber Essentials

Cyber Essentials and Cyber Essentials Plus are UK-government certification programs that help organizations of all sizes to implement five critical cyber security controls: firewalls, secure configuration, access control, malware protection, and patch management.

Essential Eight

A framework of eight essential mitigation strategies recommended by the Australian Signals Directorate (ASD) to protect organizations.

GDPR (General Data Protection Regulation)

The EU’s rigorous privacy and security law that imposes obligations onto organizations anywhere, so long as they target or collect data related to people in the EU.

HIPAA

The US Health Insurance Portability and Accountability Act, which sets the standard for protecting sensitive patient data.

PCI DSS

The Payment Card Industry Data Security Standard, required for any organization that processes, stores, or transmits credit card information.

NERC CIP

The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) is a set of mandatory cybersecurity and physical security standards for the protection of energy infrastructure.

Category: Infrastructure and Network Security

Cloud Repatriation

The process of moving data and applications away from public cloud providers and back onto on-premises or private cloud infrastructure.

LDAP / LDAPS Proxy

A gateway that allows legacy systems and appliances to utilize modern MFA by proxying the Lightweight Directory Access Protocol.

On-Premises MFA

A deployment model where the MFA solution is hosted entirely within the organization’s own data center, providing maximum data control.

RADIUS (Remote Authentication Dial-In User Service)

A networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) for users who connect to a network service.

RadSec

A protocol that secures RADIUS traffic by using Transport Layer Security (TLS), ensuring that authentication data is encrypted while in transit.

SCADA (Supervisory Control and Data Acquisition)

SCADA is a system of software and hardware that enables organizations to remotely monitor, control, and collect real-time data from industrial processes and critical infrastructure.

Start your free trial today. No credit card required.

Sign up and Go