authentication (MFA). SSO lets users
securely authenticate with multiple
applications and websites by logging in
once with just one set of credentials.
With SSO, the applications or websites
users access rely on a trusted third
party to verify users are who they say
they are. MFA, on the other hand, is a
security system that verifies a user’s
identity by requiring multiple credentials.
Rather than just asking for a username
and password, MFA requires other –
additional – credentials, such as a code
from the user’s smartphone, the answer
to a security question, a fingerprint, or
facial recognition.
Many organisations
offer incentives to
employees such as
‘work from home
Fridays’, with the
aim of increasing
morale and staff
retention rates.
www.intelligentciso.com
|
Issue 17
Every time a user logs into a new
application or machine, it is an
opportunity for hackers. To be on the
defensive, companies should have
an authentication strategy in place,
protecting both data and end-users.
In addition, companies should
ensure that their authentication
solution of choice can adapt to meet
new and advanced types of attacks
from cybercriminals.
The removal of passwords is the
desired objective of everyone in the
cybersecurity industry. However,
passwordless authentication is not
supported by most applications. Only
companies that have deployed a modern
cloud-based identity solution can make
a passwordless future a reality, today. In
the meantime, implementing secondary
forms of authentication will mean that
many cyberattacks are prevented.
A phishing attack may garner a user’s
credentials, but it can’t provide the
hacker with a fingerprint. A major benefit
of SSO and MFA is they work across
devices, meaning that whether a user is
in the office or at home, they are signing
on securely from all devices.
At the moment, we’re heavily reliant
on on-premises networks and desktop
technologies. However, as we transition
into the cloud and out of the office, it
is the responsibility of organisations to
ensure that their employees – wherever
in the world they may be – are accessing
company files safely and securely.
As ‘the norm’ shifts, it’s only natural
that more and more companies will
implement remote working policies – the
distributed and diverse workforce of the
future is just that, the future.
Working practices must evolve in order
to not fall behind the times, however,
as we evolve, so do the threats. Only
by taking active steps to mitigate
these risks can we move forward
without friction and support the remote
workforce of the future. u
65