Guide to a Better MFA Beyond Binary Authentication

The 2019 Consumer Reports article “2 Billion Stolen Emails & Passwords Surface Online”
indicates that there are 2.2 billion victims of password theft of 4.2 billion global internet users.
It is mind-boggling that some still insist on using simple passwords like “password”--one of five most popular passwords from 2019--and expect to be protected. Even passwords optimized for length, uniqueness, and complexity fail to measure up. As the National Cyber Security Centre (NCSC) lays out, “It doesn’t matter how ‘good’ your password is, it is not enough to secure access... on its own.” As security leaders look to better address account takeovers, almost threequarters (74%) agree that relying on password and traditional two-factor authentication (2FA) isn’t enough. Are traditional passwords and two-factor
authentication approaches no longer sufficient for securing user access?
CISOs and CSOs can no longer rely on traditional identity authentication management (IAM) methods to protect their companies or employees. In fact, 74% of CIOs agree that traditional passwords and two-factor authentication (2FA) approaches are no longer sufficient to secure user access (Pulse Q&A “Going Beyond MFA” survey).
















I consent to have this website store my submitted information so they can respond to my inquiry. See YourPrivacy Policy to learn more about how we use data.

By clicking 'Download Now' you agree to our Terms of Use. We take your privacy seriously. For more information please read our Privacy Policy. By registering with the Enterprise Guide you will automatically receive our weekly Product Update and Technology Insider eNewsletters.

Copyright 2021 Enterprise Guide. All Rights Reserved. Terms of Use | Privacy Policy