{"id":9298,"date":"2022-03-25T19:55:59","date_gmt":"2022-03-25T19:55:59","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-gl\/?p=9298"},"modified":"2022-03-25T19:55:59","modified_gmt":"2022-03-25T19:55:59","slug":"modern-multi-factor-authentication-for-your-organization","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-kh\/blogs\/modern-multi-factor-authentication-for-your-organization\/","title":{"rendered":"MODERN MULTI-FACTOR AUTHENTICATION FOR YOUR ORGANIZATION"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9298\" class=\"elementor elementor-9298\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fe3fa50 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fe3fa50\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9a86f94\" data-id=\"9a86f94\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e787ba2 elementor-widget elementor-widget-text-editor\" data-id=\"e787ba2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<div class=\"blog-post-des\"><div class=\"blog-post-detail\"><p>Data security and data privacy are two ongoing issues of prime concern for every organization. Data breaches are known to incur huge losses to organizations. According to\u00a0<a href=\"https:\/\/enterprise.verizon.com\/resources\/executivebriefs\/2020-dbir-executive-brief.pdf\" target=\"_blank\" rel=\"noopener\">Verizon\u2019s 2020 Data Breach Investigations Report<\/a>, credential theft, social attacks, and errors cause over 67 percent of data breaches. Personal data accounts for 58 percent of the total breaches.<\/p><p>The pandemic exposed organizations to increased security risks. The overnight move to remote working, unsecured endpoints and increased use of personal networks and devices have gained the attention of malicious players. We now live in a world where just a password is not enough to secure sensitive information at an organizational or user level. Over 81 percent of hacking-related data breaches are password-related, according to Verizon. What can organizations do to secure their data better?<\/p><p><strong>The move to modern authentication protocols<\/strong><\/p><p>Microsoft defines modern authentication as \u201can umbrella term for a combination of authentication and authorization methods between a client (for example, your laptop or your phone) and a server, as well as some security measures that rely on access policies that you may already be familiar with.\u201d It is a set of different protocols that aim to improve cloud security. Some examples of modern authentication protocols include Security Assertion Markup Language (SAML), Web Services Federation (WD-Federation or WS-Fed), and OAuth.<\/p><p>Modern authentication steps away from a password-centric authentication to a token-based approach to govern access to every user and resource. The tokens can be defined based on user location, device, role, etc. For instance, Microsoft users are authenticated via their Office 365 identity and is extensible to other third-party applications.<\/p><p><strong>Is modern authentication required for MFA?<\/strong><\/p><p>The password-centric era may soon be coming to an end. With technologies such as Seamless Sign-On and password-less authentication by Yubico, Entrust, Google or Microsoft \u2013 the need for passwords is virtually eliminated. Multi-factor authentication (MFA) is a subset of modern authentication. It provides an additional layer of security for the entire organization by validating users based on location, device, biometrics, hardware\/software tokens, one-time passwords, IP ranges, and much more. It helps improve business security by:<\/p><ul><li><strong>Enforcing policy-based granular access<\/strong><\/li><\/ul><p>For most organizations, MFA is an essential security default enforced for every user. It helps organizations in enabling conditional access\/authentication policies that are based on contextual factors, role, device, location, etc. MFA allows organizations to define access policies that can be granular, configurable, and specific control rules. The granular-level security limits access to users, ensuring the right people get access to the right tools.<\/p><ul><li><strong>Providing consistent access security<\/strong><\/li><\/ul><p>The traditional office environment includes on-premises secure networks and systems that mitigate data risks. But the recent proliferation of cloud applications has left organizations wondering how to extend the same level of security (as on-premises) to their cloud applications. MFA makes access to cloud applications more secure and provides visibility across multiple applications.<\/p><ul><li><strong>Providing clear visibility into all devices<\/strong><\/li><\/ul><p>Remote work also translates to many unsecured endpoints getting added daily. Security teams require device-based security to increase device visibility while reducing the dependency on-premises tools. MFA enables and enforces device visibility from end-user devices.<\/p><ul><li><strong>Enabling better security protocols<\/strong><\/li><\/ul><p>Most security protocols are moving away from basic or legacy authentication methods. Legacy authentication is vulnerable to attacks raising compliance and safety concerns. Companies like Microsoft have disabled legacy authentications for all clients to support modern authentication methods. For modern MFA to be effective, organizations need to disable legacy authentication. Microsoft reports, \u201corganizations that disabled authentication\u00a0experienced 67 percent fewer compromises than that where legacy authentication was enabled.\u201d<\/p><p>Security vulnerabilities are an ongoing battle for highly regulated industries such as banks, financial services, and healthcare. Organizations must understand the new norm is affecting every aspect of their operations. A new wave of inexperienced remote workers is still learning how to fit in a non-traditional workspace. While security training is a part of security administration, MFA would equip organizations with the required security blanket.<\/p><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Data security and data privacy are two ongoing issues of prime concern for every organization. Data breaches are known to incur huge losses to organizations. According to\u00a0Verizon\u2019s 2020 Data Breach Investigations Report, credential theft, social attacks, and errors cause over 67 percent of data breaches. Personal data accounts for 58 percent of the total breaches. &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-kh\/blogs\/modern-multi-factor-authentication-for-your-organization\/\"> <span class=\"screen-reader-text\">MODERN MULTI-FACTOR AUTHENTICATION FOR YOUR ORGANIZATION<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":5,"featured_media":15059,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[109],"tags":[112],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts\/9298"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/comments?post=9298"}],"version-history":[{"count":0,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts\/9298\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media\/15059"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media?parent=9298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/categories?post=9298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/tags?post=9298"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/whitepapers?post=9298"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/case_studies?post=9298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}