{"title":"如何处理MFA旁路","authors":"Ben Jacob","doi":"10.12968/s1353-4858(22)70070-0","DOIUrl":null,"url":null,"abstract":"Multi-factor authorisation has become essential in this era of remote working. It undoubtedly adds a significant layer of security, but it's not without its own weaknesses, which threat actors have been quick to exploit. The trick is to spot when this is happening and takes the right steps to keep your organisation secure.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"54 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"How to deal with MFA bypass\",\"authors\":\"Ben Jacob\",\"doi\":\"10.12968/s1353-4858(22)70070-0\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Multi-factor authorisation has become essential in this era of remote working. It undoubtedly adds a significant layer of security, but it's not without its own weaknesses, which threat actors have been quick to exploit. The trick is to spot when this is happening and takes the right steps to keep your organisation secure.\",\"PeriodicalId\":100949,\"journal\":{\"name\":\"Network Security\",\"volume\":\"54 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Network Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1353-4858(22)70070-0\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(22)70070-0","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Multi-factor authorisation has become essential in this era of remote working. It undoubtedly adds a significant layer of security, but it's not without its own weaknesses, which threat actors have been quick to exploit. The trick is to spot when this is happening and takes the right steps to keep your organisation secure.