When MFA Goes Wrong and How to Set It Right
With more than three decades of use, MFA is a proven method to reduce the risk of breaches due to stolen or weak credentials. While nearly any MFA method is an improvement over username and password alone, creative and resourceful attackers continue to expose weaknesses in legacy solutions such as token- or telephony-based authentication. When considering or reviewing your secure access options, valuable lessons can be learned from some of these real-world examples.
For this session, join Steve Won from Duo for a grounded discussion on how MFA methods have evolved, a dissection of several successful attacks, and to learn how modern MFA solutions fare against the same threats. Additionally, with our new Device Health application, we are now able to extend these capabilities further, reducing the risk of security breaches (ransomware, malware, data loss, etc.) due to unsafe and vulnerable laptop/desktop devices.