• Advertising
  • Disclaimer
  • Copy Right
  • Contact us
  • About us
WTM News
  • Home
  • entertainment
    • All
    • games
    • movies
    • music
    • sports
    '1899': The creators assure that they are already working on the next seasons and a possible ending

    ‘1899’: The creators assure that they are already working on the next seasons and a possible ending

    Las películas españolas que más esperamos en 2023

    Las películas españolas que más esperamos en 2023

    From 'Appointment in St. Louis' to 'Fifteen Days of Pleasure': 10 Great Christmas Musicals in Film History

    From ‘Appointment in St. Louis’ to ‘Fifteen Days of Pleasure’: 10 Great Christmas Musicals in Film History

    'Dreamland' review, by Jason Momoa on Netflix

    ‘Dreamland’ review, by Jason Momoa on Netflix

    Review, 'Kings vs. Santa': Family Christmas spirit with a thug twist

    Review, ‘Kings vs. Santa’: Family Christmas spirit with a thug twist

    release date, cast, synopsis

    release date, cast, synopsis

  • business
    • All
    • startups
    How to Buy Cryptocurrency

    How to Buy Cryptocurrency

    The first retail site in the Middle East

    The first retail site in the Middle East!

    Submit your projects to duty cope professional freelancers!

    Submit your projects to duty cope professional freelancers!

    bitumen 60/70

    Iran Bitumen

    Study Smart: Tips and Tricks to Ace the GED Test

    Study Smart: Tips and Tricks to Ace the GED Test

    Things to Remember When Taking the GED Math Test

    Things to Remember When Taking the GED Math Test

    DutyCope is the newest freelance platform

    Dutycope is the newest freelance platform

    What plans does NASA have to continue working with Russia?

    What plans does NASA have to continue working with Russia?

    Dutycope, the introduction of one of the best freelance sites

    Dutycope, the introduction of one of the best freelance sites

  • Technology
    • All
    • apps
    • gadget
    • mobile
    profesiones tecnológicas tecnología circular

    Circular technology: this is how it will evolve

    Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

    Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

    Roberto Lopez Familia Martínez

    Interview with Roberto López, Corporate CTO Familia Martínez

    Cloudera Data Platform One

    Cloudera Data Platform One, accessible data analytics

    Cloud services to solve complex IT problems

    SAP deploys the first public cloud project at Cepsa

    appian world data fabric

    Appian joins the Low-Code Data Fabric

    Trending Tags

  • lifestyle
    • All
    • foods
    • health
    • travel
    Body Contouring

    Common Types of Body Contouring Methods

    Cyruscrafts decorative handicrafts

    Iranian Decorative Handicrafts

    3 Days in Dubai – Where to Visit in Dubai

    3 Days in Dubai – Where to Visit in Dubai

    Ata Ghotbi and the road to success

    Ata Ghoutbi and the Road to Success

    5 ways to open frozen pipes without damaging the pipe

    5 ways to open frozen pipes without damaging the pipe

    Why is it better not to use toilet paper?

    Why is it better not to use toilet paper?

    Trending Tags

  • Review
    Review of the first part of the fifth season of the Money Heist series

    Review of the first part of the fifth season of the Money Heist series

    Introduction of Solar Ash game

    Introducing and reviewing the interesting game Solar Ash

    Review Huawei WATCH FIT smartwatch

    Review Huawei WATCH FIT smartwatch

  • Videos
No Result
View All Result
  • Home
  • entertainment
    • All
    • games
    • movies
    • music
    • sports
    '1899': The creators assure that they are already working on the next seasons and a possible ending

    ‘1899’: The creators assure that they are already working on the next seasons and a possible ending

    Las películas españolas que más esperamos en 2023

    Las películas españolas que más esperamos en 2023

    From 'Appointment in St. Louis' to 'Fifteen Days of Pleasure': 10 Great Christmas Musicals in Film History

    From ‘Appointment in St. Louis’ to ‘Fifteen Days of Pleasure’: 10 Great Christmas Musicals in Film History

    'Dreamland' review, by Jason Momoa on Netflix

    ‘Dreamland’ review, by Jason Momoa on Netflix

    Review, 'Kings vs. Santa': Family Christmas spirit with a thug twist

    Review, ‘Kings vs. Santa’: Family Christmas spirit with a thug twist

    release date, cast, synopsis

    release date, cast, synopsis

  • business
    • All
    • startups
    How to Buy Cryptocurrency

    How to Buy Cryptocurrency

    The first retail site in the Middle East

    The first retail site in the Middle East!

    Submit your projects to duty cope professional freelancers!

    Submit your projects to duty cope professional freelancers!

    bitumen 60/70

    Iran Bitumen

    Study Smart: Tips and Tricks to Ace the GED Test

    Study Smart: Tips and Tricks to Ace the GED Test

    Things to Remember When Taking the GED Math Test

    Things to Remember When Taking the GED Math Test

    DutyCope is the newest freelance platform

    Dutycope is the newest freelance platform

    What plans does NASA have to continue working with Russia?

    What plans does NASA have to continue working with Russia?

    Dutycope, the introduction of one of the best freelance sites

    Dutycope, the introduction of one of the best freelance sites

  • Technology
    • All
    • apps
    • gadget
    • mobile
    profesiones tecnológicas tecnología circular

    Circular technology: this is how it will evolve

    Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

    Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

    Roberto Lopez Familia Martínez

    Interview with Roberto López, Corporate CTO Familia Martínez

    Cloudera Data Platform One

    Cloudera Data Platform One, accessible data analytics

    Cloud services to solve complex IT problems

    SAP deploys the first public cloud project at Cepsa

    appian world data fabric

    Appian joins the Low-Code Data Fabric

    Trending Tags

  • lifestyle
    • All
    • foods
    • health
    • travel
    Body Contouring

    Common Types of Body Contouring Methods

    Cyruscrafts decorative handicrafts

    Iranian Decorative Handicrafts

    3 Days in Dubai – Where to Visit in Dubai

    3 Days in Dubai – Where to Visit in Dubai

    Ata Ghotbi and the road to success

    Ata Ghoutbi and the Road to Success

    5 ways to open frozen pipes without damaging the pipe

    5 ways to open frozen pipes without damaging the pipe

    Why is it better not to use toilet paper?

    Why is it better not to use toilet paper?

    Trending Tags

  • Review
    Review of the first part of the fifth season of the Money Heist series

    Review of the first part of the fifth season of the Money Heist series

    Introduction of Solar Ash game

    Introducing and reviewing the interesting game Solar Ash

    Review Huawei WATCH FIT smartwatch

    Review Huawei WATCH FIT smartwatch

  • Videos
No Result
View All Result
WTM News
No Result
View All Result
  • Home
  • entertainment
  • business
  • Technology
  • lifestyle
  • Review
  • Videos
Home Technology

Should MFA mechanisms be mandatory?

News writer by News writer
June 11, 2022
in Technology
7 0
A A
0
inversión en ciberseguridad CFOs Centros de Operaciones de Seguridad políticas de seguridad MFA

Should MFA mechanisms be mandatory

153
SHARES
235
VIEWS
Share on FacebookShare on Twitter

Should MFA mechanisms be mandatory?
is the headline of the news that the author of WTM News has collected this article. Stay tuned to WTM News to stay up to date with the latest news on this topic. We ask you to follow us on social networks.

investment in cybersecurity CFOs Security Operations Centers security policies MFA

Yes, but it is better that they are not based on SMS. Confidence in verifying a person’s identity through the use of passwords has been declining over time. As the weakness of the usual passwords became evident, there was a growing difficulty in remembering those credentials that were more complex and robust. Hence, multi-factor authentication (MFA) mechanisms have become a must-use procedure in many online environments.

The password alone is not enough

The security of users when they access their online accounts almost inevitably goes through the use of passwords. Much has been said about how complex these secret words should be to reduce the probability of being discovered in the face of a brute force attack. The inclusion of uppercase and lowercase letters, the use of special characters or even the length of not less than eight characters are common recommendations. In fact, of all the recommendations mentioned, it is the length that provides the most security: the more characters a password contains, the more difficult it will be to discover, although it will also be more difficult to remember it.

In this context, the usefulness of password managers becomes clear, in charge of acting as safes in which to store the access credentials (this time, sufficiently complex) of the environments and applications in which the user is registered. But, even so, they continue to be insufficient; after all, “a password protects other passwords”.

Strong authentication mechanisms: The use of strong authentication mechanisms inescapably rises up as a complementary and indispensable element for verifying a user’s identity. The adaptation of the financial sector to the PCI DSS 4.0 standard has served as a spearhead for the use of these mechanisms that make identity verification more robust, even more so when it comes to financial transactions. Actors as relevant as Google, Saleforce or even Github have begun to state that, sooner rather than later, they will protect their systems with MFA on a mandatory basis. At the moment, most systems already make use of services called OTP -One Time Password- that allow adding a second level of authentication (2FA) to the traditional pairs of username and password.

SMS as 2FA

One of these double authentication mechanisms consists of the use of SMS, that is, a code that is received on the mobile phone and that the user must enter in the system to access their online account. However, despite us, and although it seems robust, it is certainly an insecure procedure. So much so that both the North American NIST and the European ENISA do not recommend its use. SIM-swapping attacks (illicitly requesting a duplicate of the SIM of a mobile phone), hacking of the SS7 protocol, or even social engineering techniques based on the theft of access codes received in the terminal, are more common than we think.

Multi-factor authentication (MFA) mechanisms have become a must-use procedure in many online environments

Despite this, SMS are still widely used, from public environments, to e-commerce applications or even for access to bank accounts. The reasons are easy to explain: passwords are usually a burden for application managers, so the implementation of a second level, even if it is based on SMS, is a “sufficiently” effective solution; On the other hand, most users usually have a mobile phone and are at least capable of receiving SMS; Last but not least, they do not require anything else from the user, who should not install any application or request the activation of any double authentication mechanism since by default, it will be activated and associated with their mobile phone, or better said, to your SIM card.

The mobile as a means of authentication

Mobile terminals also serve as physical authentication tokens. In these cases, a software application installed on the terminal acts as an authentication tool, providing single-use tokens. This is what is known as “PUSH authentication applications”. Examples of this type of applications are found in Google Authenticator, Microsoft Authenticator, Cisco Duo, etc.

However, these applications also have their limitations: they need Internet access on the terminal, they can be compromised by malware downloaded to mobile phones or even, as has happened recently, they can be subjected to social engineering attacks known as “MFA Prompt”. Bombing” in which the attacker bombards his victim’s terminal requesting the approval of an authentication request that allows him to take control of his account.

FIDO, the path to authentication without passwords A few days ago, Apple, Google and Microsoft decided to give their own initiatives a new direction and try to make them converge within what is known as the FIDO Alliance. The three came together to promote the adoption of the FIDO2 standard whose objective is the use of a mechanism that does not require passwords for authentication in own and third-party services.

FIDO authentication is based on private key systems or biometric identification systems so that you can, for example, swipe a fingerprint or enter a PIN, and don’t have to remember a complex password. To do this, it uses public key cryptography (through WebAuthn and CTAP protocols) that allows users to identify themselves with biometric data, PINs or external FIDO authenticators, on a FIDO2 server belonging to a website or application. The credentials are unique for each environment and never leave the terminal in which they are installed. In this way they are not vulnerable to use in other environments.

And if it’s not FIDO, what?

However, FIDO still has some way to go. The FIDO2 standard is slowly but steadily gaining consistency. Perhaps in the next few years we may see the first signs of its wider adoption.

Meanwhile, we should think that the use of MFA systems cannot wait and that, either through physical tokens, through mobile phone applications or biometric systems, we should all use double authentication mechanisms that reduce our risks against potential theft of credentials or accounts commonly used in our daily lives.

One final note: note that we did not mention SMS-based systems. As bad as it weighs us, and following international recommendations, its use as an authentication mechanism should tend to disappear.

By Juanjo Galán, Business Strategy at All4Sec

Source: revistabyte.es

Tags: mandatorymechanismsMFA
Previous Post

Destroy documents and move computers: this is the escape plan of the mayors of the most active front in the war in Ukraine | International

Next Post

‘The Boys’ confirms its season 4 after destroying the 3

News writer

News writer

I try to find the best news for you and publish it on WTM News. Follow my articles to become an up-to-date person!

Related Posts

profesiones tecnológicas tecnología circular
Technology

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology
Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Roberto Lopez Familia Martínez
Technology

Interview with Roberto López, Corporate CTO Familia Martínez

November 23, 2022
Cloudera Data Platform One
Technology

Cloudera Data Platform One, accessible data analytics

November 22, 2022
Cloud services to solve complex IT problems
Technology

SAP deploys the first public cloud project at Cepsa

November 22, 2022
appian world data fabric
Technology

Appian joins the Low-Code Data Fabric

November 22, 2022
Next Post
'The Boys' confirms its season 4 after destroying the 3

'The Boys' confirms its season 4 after destroying the 3

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Tesla's new update notifies the driver of tire wear

Tesla’s new update notifies the driver of tire wear

December 16, 2021
'Stranger Things': Jamie Campbell Bower opens up about her secret role for the first time

‘Stranger Things’: Jamie Campbell Bower opens up about her secret role for the first time

May 31, 2022
Introduction of Solar Ash game

Introducing and reviewing the interesting game Solar Ash

July 25, 2021
Time Magazine introduced Elon Musk as the character of 2021!

Time Magazine introduced Elon Musk as the character of 2021!

July 24, 2021
Introduction of Solar Ash game

Introducing and reviewing the interesting game Solar Ash

0
Added the ability to check voice messages before sending to WhatsApp!

Added the ability to check voice messages before sending to WhatsApp!

0
Time Magazine introduced Elon Musk as the character of 2021!

Time Magazine introduced Elon Musk as the character of 2021!

0
Review of the first part of the fifth season of the Money Heist series

Review of the first part of the fifth season of the Money Heist series

0
At least one dead and 19 injured by two explosions at bus stops in Jerusalem |  International

At least one dead and 19 injured by two explosions at bus stops in Jerusalem | International

November 23, 2022
profesiones tecnológicas tecnología circular

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Li Qiang, Xi Jinping's loyal lieutenant |  International

Li Qiang, Xi Jinping’s loyal lieutenant | International

November 23, 2022

Latest News

At least one dead and 19 injured by two explosions at bus stops in Jerusalem |  International

At least one dead and 19 injured by two explosions at bus stops in Jerusalem | International

November 23, 2022
profesiones tecnológicas tecnología circular

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Li Qiang, Xi Jinping's loyal lieutenant |  International

Li Qiang, Xi Jinping’s loyal lieutenant | International

November 23, 2022

Suggest application sites

Weltnachrichten

Nachrichten Star

Dutycope

Freelance sites

Marze Safar

Food Cake

Arabic news

BackPack Travel

Travel Vision

Cooking

Drinks & Foods

WTM News

WTM News is a smart magazine that collects new and important technology news of the world for you from all over the web.
Our goal is to compile the best news so that you can more easily get the latest technology news in the world.

Follow us

News Categories

  • apps
  • business
  • entertainment
  • Environment
  • foods
  • gadget
  • games
  • health
  • lifestyle
  • mobile
  • movies
  • music
  • News
  • Other
  • Review
  • science
  • sports
  • startups
  • Technology
  • travel
  • Videos

Freelancer | Logo design | Hervess | Nachrichten Star | News Pro | Arabic news

Buy sponsor post | Marze Safar | BackPack Travel | Food Cake

How to cook any thinks | Learning how to make cakes and sweets

latest news

Review of the first part of the fifth season of the Money Heist series

The fifth season of Money Heist series

The points given are based solely on the personal taste of
Introduction of Solar Ash game

Solar Ash game

Score against the average score of this game on the site

WTM NEWS Magazine is just a portal for republishing news in various fields. All news will be placed on the site by mentioning the source. WTM NEWS has no legal responsibility for the accuracy of the news and articles and only reposts the news. © 2022 WTM NEWS

No Result
View All Result
  • Home
  • entertainment
  • business
  • Technology
  • lifestyle
  • Review
  • Videos

WTM NEWS Magazine is just a portal for republishing news in various fields. All news will be placed on the site by mentioning the source. WTM NEWS has no legal responsibility for the accuracy of the news and articles and only reposts the news. © 2022 WTM NEWS

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist