skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration


While not an enterprise authentication panacea, MFA has become an essential component for any organization's security strategy.


  • Entire databases of user credentials have been leaked into the wild for malicious hackers to use at their leisure. As a result, enterprises have sought enhanced authentication practices, and MFA has become an essential to secure access to data and resources.

Features and Benefits

  • Understand the types of attacks the FBI says are being increasingly used by attackers to exploit MFA techniques.
  • Learn the free defense that anyone can use to guard against the threat of SIM-swapping attacks.

Key questions answered

  • Which types of attack does the FBI say are being increasingly used by attackers to exploit MFA techniques?
  • How can internet-based phone services help guard against MFA attacks?

Table of contents

Ovum view

  • Summary
  • The war for authentication
  • Multifactor authentication solutions
  • MFA methods are being targeted
  • Defensive strategies
  • Users need to be proactive
  • Bottom line


  • Further reading
  • Author

Recommended Articles


Have any questions? Speak to a Specialist

Europe, Middle East & Africa team: +44 7771 980316

Asia-Pacific team: +61 (0)3 960 16700

US team: +1 212-652-5335

Email us at

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Email us at

Contact marketing -

Already an Ovum client? Login to the Knowledge Center now