Multi-Factor Authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for web and mobile apps.
RISK ALERT
Hi <<First Name>>,
As threats to password security have increased in recent years and there’s been a dramatic increase of Ransomware claims experienced by Cyber Insurers, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. What is Multi-Factor Authentication (MFA) is and why it is so important to you and your clients?
Please read more below and contact us if you would like to discuss further.
Regards,
Robert & Mandy Cooper
and the CPR Insurance team CPR INSURANCE SERVICES
p (07) 3123 1137 | m 0439 530910
Your award winning Insurance Broker ...
General Advice Warning:
Please be aware any advice that may have been given or implied is General advice only. We have not taken into consideration your individual needs, objectives or financial requirements. Before deciding to purchase a financial product, you should consider the appropriate Product Disclosure Statement to ensure the product is suitable for your needs.
INSURANCE NEWS
What Multi-Factor Authentication (MFA) is?
Multi-Factor Authentication (MFA) is an authentication method that requires users to verify identity using multiple independent methods. Instead of just asking for a username and password, MFA implements additional credentials such as a SMS text message with code, software token or authenticator application.
As per the ACSC’s website, MFA is one of the most effective controls an organisation can implement to prevent an adversary from gaining access to a device or network and accessing sensitive information. When implemented correctly, multi-factor authentication can make it significantly more difficult for an adversary to steal legitimate credentials to facilitate further malicious activities on a network. Due to its effectiveness, multi-factor authentication is one of the Essential Eight from the Strategies to Mitigate Cyber Security Incidents.