top of page
  • Joel Hawbaker

The Bare Minimum



Many businesses still don’t use MFA to secure VPN access. Is yours one of them? How would you know if a threat actor logged in with stolen credentials?


Here are some MFA options to consider:


1️⃣ Smart Cards and Hardware Tokens: Employing physical devices like smart cards and hardware tokens to generate unique codes, making it nearly impossible for unauthorized access. These combined methods offer a robust defense against potential threats.


2️⃣ Machine Certificates: Certificates issued to devices for authentication, ensuring only trusted machines can access the VPN.


3️⃣ Mobile App Authenticators: Apps like Google Authenticator and Microsoft Authenticator generate time-based codes for enhanced security.


4️⃣ Biometric MFA: Utilizing fingerprints, facial recognition, or even iris scans for user validation.


5️⃣ Push Notifications: Users receive a prompt on their mobile devices to approve or deny access requests.


Don’t forget about posture assessments and don’t underestimate the risks of leaving your remote access unprotected. Implementing MFA is essential to defend against potential security breaches and keep your organization’s data safe.

Comments


bottom of page