Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Strong Authentication Considerations for Digital, Cloud-First Businesses
  • Data Breach

Strong Authentication Considerations for Digital, Cloud-First Businesses

4 years ago Tripwire Guest Authors
Strong Authentication Considerations for Digital, Cloud-First Businesses

Authentication as a baseline security control is essential for organizations to know who and what is accessing corporate resources and assets.  The Cybersecurity and Infrastructure Security Agency (CISA) states that authentication is the process of verifying that a user’s identity is genuine.

In this climate of advanced cyber threats and motivated cyber criminals, organizations need to implement strong authentication to protect against sophisticated attacks.  Strong authentication is a method used to secure computer systems and/or networks by verifying a user’s identity, and it includes several technologies and methods, including multi-factor authentication (MFA).  This article will highlight some of the technologies and methods that facilitate and enable strong authentication.

Businesses are Slowly Moving Away from Insecure Passwords

Usernames and passwords have traditionally unlocked the front door to an organization, allowing access to resources and data asset.  Passwords, however, are insecure.  When user Joe Smith enters his username and password to request access to organizational resources and assets, how does the organization know that it’s him and not someone else simply using his password? 

There is simply no way to know with any degree of certainty without stronger authentication.  Relying solely on a user to enter their password as a means of authenticating their identity before gaining access to an organization’s resources and data is just too risky.  As a result, businesses are learning that they need to mature their methods by moving away from the username and password model to strong authentication. 

In the 2021 Thales Access Management Index report, which includes survey results from more than 2,600 respondents in more than 10 countries, the findings showed that while respondents were on their journey to more sophisticated and modern authentication capabilities which included multi-factor authentication (MFA) adoption, the global average for MFA adoption was just 55%.  This demonstrates that MFA in the context of strong authentication is not yet the norm. 

Strategic Considerations

As organizations move towards modern authentication, it will be important to consider how a strong solution will support business objectives, users’ experience, and address the organization’s risks.  To accomplish this, organizations should consider implementing different methods based on different risk levels.  To avoid any overlap in tools or solutions, it is important for organizations to take inventory of the solutions that are already in place to address identity and access management and authentication. 

Technology Considerations

Implementing MFA makes it more difficult for a threat actor to gain access to information systems, such as remote access technology, email, and billing systems, even if passwords are compromised through phishing attacks or other means.  MFA is a layered approach to secure access.  To enable MFA, you must provide a combination of two or more authenticators (i.e., a combination of something you have, something you know or something you are) to verify your identity before access is granted.  Technologies for MFA include:

  • One-Time Passwords (OTP): technology based on a shared secret stored on the authentication device
  • Certificate-based Authentication (CBA): ensures authentication using a public and private encryption key that is unique to the authentication device and the person who possesses.  Examples include USB tokens and smart cards.  
  • Context-based Authentication: Context-based authentication uses contextual information to ascertain whether a user’s identity is authentic or not, and is recommended as a complement to other strong authentication technologies
  • Fast Identity Online (FIDO) authentication uses secure biometric authentication mechanisms – like facial recognition and fingerprints to authenticate users

While MFA is more secure than using a single factor for authentication (i.e. password only), it does not protect against sophisticated phishing attacks.  For example, users can be fooled into providing a one-time code corresponding to a security prompt that grants the attacker access to an organization’s data. 

MFA processes using shared secrets are vulnerable to phishing attacks.  As a result, and because government officials are often the target of sophisticated phishing attacks, the U.S. federal government requires phishing-resistant MFA.  Phishing-resistant MFA uses asymmetric key cryptographic authentication processes.  Phishing-resistant approaches to MFA includes the federal government use of the Personal Identity Verification (PIV) standard to protect against sophisticated phishing attacks.  CISA states that only FIDO authentication is phishing resistant. 

Pitfalls to Avoid

One common pitfall is unintentionally creating operational complexity by deploying different tools at different times.  The Thales Access Management Index report highlights that a third (33%) of respondents said they use three or more authentication access management tools.   Coordinating many systems may not only create operational complexity, but it may increase the risk of errors or misconfigurations which may create security gaps.

While strong authentication will protect against attacks in a manner that weak authentication cannot, it is not a solution that should be deployed without regard to the human element.  End-user training and awareness about technology and methods should be provided to employees to ensure that they are using strong authentication in accordance with best security practices.

Conclusion

Strong authentication is key to a mature cybersecurity program.  It is the foundation for an organization’s identity systems and access controls, and is considered a necessary step in achieving a Zero Trust Architecture, and to obtain cyber insurance. Strong authentication requires technology that will protect against the more common methods of gaining unauthorized access to data, as well as sophisticated, targeted phishing attacks.  As organizations implement strong authentication, due consideration must be given to strategically selecting a tool or solution that will meet user needs, business objectives and avoid operational complexity.


About the Author: Ambler Jackson is an attorney with an extensive background in corporate governance, regulatory compliance, and privacy law. She currently consults on governance, risk and compliance, enterprise data management, and data privacy and security matters in Washington, DC. She also writes with Bora about today’s most important cybersecurity and regulatory compliance issues. 

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Strong Authentication Considerations for Digital, Cloud-First Businesses” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, Encryption, Goverment, Medium Severity, Phishing, Privacy, TripWire

Continue Reading

Previous Lorenz Ransomware Exploit Mitel VoIP Systems to Breach Business Networks
Next U.S. Charges 3 Iranian Hackers and Sanctions Several Others Over Ransomware Attacks

More Stories

  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

21 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

23 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

2 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

2 days ago [email protected] (The Hacker News)

Recent Posts

  • FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks
  • Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager
  • CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026
  • Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages
  • Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT