skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Introduction

While not an enterprise authentication panacea, MFA has become an essential component for any organization's security strategy.

Highlights

  • Entire databases of user credentials have been leaked into the wild for malicious hackers to use at their leisure. As a result, enterprises have sought enhanced authentication practices, and MFA has become an essential to secure access to data and resources.

Features and Benefits

  • Understand the types of attacks the FBI says are being increasingly used by attackers to exploit MFA techniques.
  • Learn the free defense that anyone can use to guard against the threat of SIM-swapping attacks.

Key questions answered

  • Which types of attack does the FBI say are being increasingly used by attackers to exploit MFA techniques?
  • How can internet-based phone services help guard against MFA attacks?

Table of contents

Ovum view

  • Summary
  • The war for authentication
  • Multifactor authentication solutions
  • MFA methods are being targeted
  • Defensive strategies
  • Users need to be proactive
  • Bottom line

Appendix

  • Further reading
  • Author

Recommended Articles

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team: +44 7771 980316


Asia-Pacific team: +61 (0)3 960 16700

US team: +1 212-652-5335

Email us at ClientServices@ovum.com

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now