
Steve Won
Group Product Manager,
Cisco Secure
While nearly any MFA method is an improvement over username and password alone, creative and resourceful attackers continue to expose weaknesses in legacy solutions such as token- or telephony-based authentication. When considering or reviewing your secure access options, valuable lessons can be learned from some of these real-world examples.