03.12.2021 Views

Cyber Defense eMagazine December Edition for 2021

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge! Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG CDMG is a Carbon Negative and Inclusive Media Group.

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge!

Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

CDMG is a Carbon Negative and Inclusive Media Group.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

How does this relate to MFA? Well, multi-factor authentication ensures that the person sitting on the other<br />

side of the monitor is exactly who they say they are. By implementing MFA, organizations can secure<br />

their data so it cannot be accessed by any bad actor who has stolen logins and passwords. The<br />

technology giants have known about it <strong>for</strong> years.<br />

The recent research shows that the global size of the MFA market will grow from USD 11.1 billion in <strong>2021</strong><br />

to USD 23.5 billion by the end of 2026. However, many companies have previously recognized the<br />

pressing need <strong>for</strong> global MFA adoption in their organizations. Facebook, Google and Twitter were the<br />

first to implement this technology. Another, such as CA Technologies, Vasco Data Security International,<br />

RSA Security LLC or Symantec Corporation, anticipating in 2016, the growth of the market, just then<br />

began large investments in research and development in this area.<br />

My way or the highway<br />

There is no need to convince anyone about the effectiveness of MFA as the technology giants have<br />

already battle tested it. Google corporation has kept 85K employees from getting phished since 2017. A<br />

recent declaration proving that MFA is the ‘must have’, comes from Mark Risher, Sr Director of Product<br />

Management at Google. On May 6 <strong>2021</strong>, he in<strong>for</strong>med the media that soon Google account holders will<br />

be <strong>for</strong>ced to use multi- factor authentication if they still want to use the company's services.<br />

And you can't be surprised at all because, today no company network is no longer a secure castle that<br />

cannot be accessed by outsiders. On the contrary - the growing number of applications in the cloud,<br />

working from home and from unsecure networks means that every person who appears in our network<br />

must be treated as an intruder. This approach is called the zero trust security model where the key to<br />

effective data protection is making sure we know who the person sitting on the other side of the screen<br />

is. Without this certainty, no security measures are effective.<br />

A Google study found that simply adding a recovery phone number to an account prevents nearly 100%<br />

of automated bots attacks, 99% of mass phishing attacks, and 66% of targeted attacks.<br />

Too expensive, too hard<br />

So why is MFA - considered by experts to be one of the most effective methods of protecting the user<br />

against identity theft - yet still used on a handful of applications and not organization-wide?<br />

The main problem with the widespread adoption of MFA in public organizations and institutions is the<br />

complexity and costs. The implementation of multi-factor authentication throughout the entire<br />

organization, requires a lot of capital and time. The highly heterogeneous IT environments, to which it is<br />

difficult to match the right tools, are also a big obstacle.<br />

One of the approaches to cybersecurity is the user access security broker approach which simply adds<br />

MFA between the application and the user. The security broker is placed as an intermediary layer that<br />

blends into the application, giving full control not only over the authentication phase, but over the entire<br />

user session. Importantly, such action does not require any programming work. It frees from the vendor<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 73<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!