Intelligent CISO Issue 17 | Page 65

authentication (MFA). SSO lets users securely authenticate with multiple applications and websites by logging in once with just one set of credentials. With SSO, the applications or websites users access rely on a trusted third party to verify users are who they say they are. MFA, on the other hand, is a security system that verifies a user’s identity by requiring multiple credentials. Rather than just asking for a username and password, MFA requires other – additional – credentials, such as a code from the user’s smartphone, the answer to a security question, a fingerprint, or facial recognition. Many organisations offer incentives to employees such as ‘work from home Fridays’, with the aim of increasing morale and staff retention rates. www.intelligentciso.com | Issue 17 Every time a user logs into a new application or machine, it is an opportunity for hackers. To be on the defensive, companies should have an authentication strategy in place, protecting both data and end-users. In addition, companies should ensure that their authentication solution of choice can adapt to meet new and advanced types of attacks from cybercriminals. The removal of passwords is the desired objective of everyone in the cybersecurity industry. However, passwordless authentication is not supported by most applications. Only companies that have deployed a modern cloud-based identity solution can make a passwordless future a reality, today. In the meantime, implementing secondary forms of authentication will mean that many cyberattacks are prevented. A phishing attack may garner a user’s credentials, but it can’t provide the hacker with a fingerprint. A major benefit of SSO and MFA is they work across devices, meaning that whether a user is in the office or at home, they are signing on securely from all devices. At the moment, we’re heavily reliant on on-premises networks and desktop technologies. However, as we transition into the cloud and out of the office, it is the responsibility of organisations to ensure that their employees – wherever in the world they may be – are accessing company files safely and securely. As ‘the norm’ shifts, it’s only natural that more and more companies will implement remote working policies – the distributed and diverse workforce of the future is just that, the future. Working practices must evolve in order to not fall behind the times, however, as we evolve, so do the threats. Only by taking active steps to mitigate these risks can we move forward without friction and support the remote workforce of the future. u 65