How are Hackers Beating Multi-Factor Authentication (MFA)?

preview_player
Показать описание
Welcome back to another video on the Jonathans Edwards Channel!
On this channel, we talk all things Tech. From the best Softwares your business should be using, to the latest updates and features that you need to know about.

Just when your thought your cloud applications were secure by implementing multi-factor authentication, hackers are developing strategies to beat this defence.
------------------------------------------------------------------------------------------------------------------------------------------------
Are you using Microsoft 365 to its fullest potential? Are you getting the most from your investment? It's time to supercharge your Microsoft 365 and your business.

Our FREE Guide - Discover 5 things in Microsoft 365 that will save your business time and money….. and one feature that increases your Cyber Security by 99.9%

------------------------------------------------------------------------------------------------------------------------------------------------
00:00 Introduction
00:40 What is 2FA?
01:54 Forms of MFA
02:50 MFA Bombing
03:14 Lapsu$ & Cozybear
03:48 Phone Calls
04:14 Authenticator App
04:38 What is the answer?
05:14 FIDO2

--------
So who am I and what do I do?

I am an IT expert with over 20 years of industry experience across a multitude of different areas. I am the Founder & Managing Director of Integral IT. Our mission is to deliver IT services that bring real value to each and every one of our customers, no matter how big or small.

If you need IT support, we can help. We can help you wherever you are in the world; you just need an internet connection.

Get your FREE guide on... here today:

-- Make Sure To Follow Me On My Socials Below --

If you have any video ideas, or if you'd like me to make a video on anything specific make sure to let me know in the comments below!
Рекомендации по теме
Комментарии
Автор

Great video Jonathan. Do you find that even complex passwords are getting brute forced, hence why the MFA Bombing is becoming more common or is it just the fact that users typically setup a weak password? I like the Yubikey solution however this must be somewhat inconvenient if working in an IT environment and trying to work on users devices if the Yubikey is with the users and distance poses an issue. I imagine as an admin, you simply turn off the MFA if the Yubikey isn't present? I am definately for MFA and use an authentication app but the points you raise are definately worth considering.

gumflapper
Автор

It is very likely that I'm missing something here, but if a user opts for the text message MFA, wouldn't the user need to type the 6 digit pin into the same workstation that's requesting access? This would make it impossible for a hacker to get logged in because they wouldn't be able to enter the 6 digit number at their computer, wouldn't it?

cobianemmanuel
Автор

"Feed-O two"... sounds like a new and improved type of dog chow!

peternospam