Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

4 Ways to Keep MFA From Becoming too Much of a Good Thing

The Hacker News by The Hacker News
February 11, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Feb 11, 2025The Hacker NewsIT Security / Threat Protection

Multi-factor authentication (MFA) has quickly become the standard for securing business accounts. Once a niche security measure, adoption is on the rise across industries. But while it’s undeniably effective at keeping bad actors out, the implementation of MFA solutions can be a tangled mess of competing designs and ideas. For businesses and employees, the reality is that MFA sometimes feels like too much of a good thing.

Here are a few reasons why MFA isn’t implemented more universally.

1. Businesses see MFA as a cost center

MFA for businesses isn’t free, and the costs of MFA can add up over time. Third-party MFA solutions come with subscription costs, typically charged per user. Even built-in options like Microsoft 365’s MFA features can cost extra depending on your Microsoft Entra license.

Plus, there’s the cost of training employees to use MFA and the time IT takes to enroll them. If MFA increases help desk calls, support costs go up too. While these expenses are far less than the cost of a security breach ($4.88 million last year), businesses don’t always see that connection clearly.

2. User experience is a persistent pain point

No matter how you slice it, MFA also brings extra steps. After entering a password, users must complete another verification step. This inevitably adds friction. Admins need to consider the form of MFA used, how often it’s required, and balance both with risk.

Combining MFA with SSO can lighten the security burden by allowing users to authenticate once to access multiple apps, rather than logging in separately to each one. This lowers friction for your users, so MFA doesn’t get in the way of work. Beyond SSO, keep end users happy by opting for an MFA platform with flexible policy settings. For example, internal workstation access probably doesn’t need MFA as often as remote access via VPN, RDP, or other external connections.

3. MFA implementation brings hidden pitfalls

Deploying MFA and training users isn’t a small task. The first step is to create and manage a system that keeps things simple — from user enrollment to monitoring MFA activity.

Choose an MFA that plays nicely with your organization’s current identity setup. Securing access to a mix of on-premises Active Directory (AD) and cloud infrastructure can mean managing multiple identities per user, creating management overhead and creating a hybrid identity security gap.

Scalability is also a factor: as the user base grows, can the system keep up? If you’re relying on a third-party MFA service, what happens if it goes down?

Then there’s the issue of connectivity. Many MFA solutions assume users are always online. But what if they’re offline or on an isolated network with limited connectivity? Consider how and where your users log on and evaluate if your MFA should support local prompts to authenticate users, even when their device isn’t connected to the internet.

4. MFA alone isn’t enough

Sure, MFA boosts security, but no MFA method is foolproof. Each approach has its own weaknesses that attackers can exploit. For example, SMS-based MFA (no longer recommended) is vulnerable to SIM-swapping attacks, while push notifications can fall victim to MFA fatigue, where users are bombarded with repeated login requests by attackers who’ve already compromised their passwords.

More advanced attackers have tools to steal session cookies, allowing them to bypass MFA entirely in some situations. SSO, while convenient, can exacerbate the problem — if an attacker breaks through one MFA barrier, they may gain access to multiple applications.

MFA doesn’t have to be this hard

The takeaway is that MFA needs to be part of a broader strategy that includes monitoring and logging to give admins visibility into authentication activities. While MFA is a crucial layer in defending against unauthorized access, deployment will bring challenges. Plan for them. For a successful MFA implementation, understand costs, consider user experience, and take a proactive approach to mitigating its limitations.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
Dataminr Unveils Partner Program To Boost AI-Powered Risk Detection In The Channel

Dataminr Unveils Partner Program To Boost AI-Powered Risk Detection In The Channel

Recommended.

Tata Communications Vayu revolucionará la nube para la empresa inteligente

Tata Communications Vayu revolucionará la nube para la empresa inteligente

March 22, 2025
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

August 6, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio