{"title":"How to deal with MFA bypass","authors":"Ben Jacob","doi":"10.12968/s1353-4858(22)70070-0","DOIUrl":null,"url":null,"abstract":"Multi-factor authorisation has become essential in this era of remote working. It undoubtedly adds a significant layer of security, but it's not without its own weaknesses, which threat actors have been quick to exploit. The trick is to spot when this is happening and takes the right steps to keep your organisation secure.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"54 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(22)70070-0","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Multi-factor authorisation has become essential in this era of remote working. It undoubtedly adds a significant layer of security, but it's not without its own weaknesses, which threat actors have been quick to exploit. The trick is to spot when this is happening and takes the right steps to keep your organisation secure.