Truesec Tech Talk - MFA stops 99,9 % of all attacks!
On Friday we will raise the topic "Multifactor Authentication (MFA)" and the importance of it, especially in times like these when many of us work Remote and in the cloud!
MFA is a method of access control where, as a user, access is granted only after successfully presenting several separate pieces of evidence for an authentication mechanism – usually in at least two of the following three categories: knowledge (something you know), possession (something you have) and inherent ( something you are).
We want to support Swedish businesses and therefore we share our experiences and give you tips on how to proactively safeguard your environment. That’s why we are launching a webinar series called “Truesec Tech Talk”. We will offer this a number of Fridays ahead, completely free of charge.
Join us on a journey 🚀 through a variety of topics in computer security. We are raising the challenges we can see at Swedish companies right now.
More about the upcoming webcast:
The security of two-step verification lies in more layers of security in the actual approach. Compromising with multiple authentication factors makes it more difficult for attackers to hack the user. This means that even if an attacker manages to get over the user’s password, it is meaningless without also having access to the additional authentication information.
An account protected with MFA is 99.9% more secure than an unprotected account. It is very important that all user accounts in the organization are protected in the same way.
How does MFA work?
It works by requiring two or more of the following authentication methods:
1. Something you know (password)
2. Something you have (a trusted device that is not easy to duplicate, like a phone)
3. Something you are (biometrics)
Security managers, IT managers, IT technicians, IT professionals and those of you who work in an IT department and who are interested in security issues.
Hasain Alshakarti, MVP Security Expert
Mikael Nyström, MVP, Cloud and Datacenter
We will discuss these issues with you and open up for dialogue at the end of the webinar. It is also possible for you to ask your questions beforehand.
Email us at email@example.com.