Here’s how cyber criminals try to hack your accounts while you sleep


Have you ever feltfrustrated by the flood of notifications from your multi-factor authentication(MFA) app?

 

Well, cyber criminals havetoo. And they're taking advantage of “MFA fatigue" to try to gain accessto your sensitive business data.

 

MFA is essential forkeeping your data secure. It adds an extra layer of security to your apps andaccounts by asking you to verify your identity in two or more ways, such as apassword and a code sent to your phone.

 

The constant alerts can beoverwhelming though.

 

Attackers know this andwill bombard employees – sometimes in the middle of the night – with a constantstream of MFA notifications. Which makes it more likely someone willauthenticate a login attempt through frustration, tiredness, or just to get thenotifications to stop.

 

But now there's a newweapon in the fight against MFA fatigue.

 

Microsoft Authenticator hasintroduced number matching as a way of making sure your MFA notification isfrom the correct login attempt, preventing cyber criminals from takingadvantage of notification fatigue.

 

How does number matchingwork?

 

When you receive an MFAnotification, the app will display a randomly generated number. You then needto input this number to authenticate the login attempt and prove you're not acyber criminal trying to access your business data.

 

That's not all. MicrosoftAuthenticator also allows for biometric authentication, which means you can useyour face, fingerprint, or other unique physical features to prove youridentity and combat the threat of MFA fatigue attacks.

 

With these securitymeasures in place, your business can stay ahead of cyber criminals and keepyour sensitive data better protected.

 

If you already useMicrosoft Authenticator, number matching is ready to use. Simply make sure your app is up-to-date, and you'll be protected.

 

If you use another MFA system and want to look at how to make yoursecurity better or easier, we can help. Get in touch.

 

 

Published withpermission from Your Tech Updates.