Multi-Factor Authentication Is No Shortcut To Cyber Resilience

Two high-profile breaches in recent months remind us of an unfortunate truth: true cyber resilience means preparing for attackers to eventually find a way in.

In both breaches, attackers acquired not only ordinary employee login credentials, but also multi-factor authentication credentials meant to protect against the former theft. Their method for doing so? Old-fashioned persistence - specifically, repeated requests to one or more employees until someone finally gave in.

This isn’t to criticise any breached organisations that clearly take security seriously. Widespread MFA implementation is no small feat. Completing that step puts organisations far ahead of most industries’ cybersecurity curve. Instead, these breaches send a clear message to organisations who treat MFA - or any other single security step - as a shortcut or stand-in for broader cyber resilience.

Modern attackers are numerous and persistent enough that broader technological and cultural changes are needed to stop the attackers that inevitably make it past the network perimeter.

Reducing Confusion & Making Resilience More Concrete

In my experience, organisations don’t tend to settle on cyber resilience shortcuts out of laziness. Instead, the impulse often comes from confusion about minimising and mitigating attacks that have already partially succeeded. The ongoing conversation around Zero Trust security is an excellent example — the average organisation hears so many different interpretations and pitches about Zero Trust that it’s difficult to tell which strategies fall under the umbrella.

The precise answer to that confusion will vary by organisation and industry. But in talking with clients and partners about cyber resiliency, I’ve seen some patterns emerge. Here are examples of the attack types related to the breaches mentioned above:

  • Successful organisations find ways to reduce the potential for employees to make the ‘wrong decision’ during an attack. For example, cloud email security can remove malicious emails from the inbox before a human sees them, and browser isolation can isolate a suspicious site, ensuring local conditions remain benign.
  • When employees make the ‘right decision,’ or the system rejects a malicious message, I see successful organisations use Secure Web Gateway (SWG) services to block malicious domains and allow or block specific IPs — especially with many employees working from their home network. Threat intelligence feeds these services to help ensure humans don’t reach known malicious content.
  • When an employee does make the wrong decision and mistakenly provides their credentials, successful organisations still prevent an active session controlled by the attacker from starting. Phishing-resistant MFA (like physical security keys) implemented through Zero Trust Network Access (ZTNA) can help here.
  • Finally, user-centric, consolidated logging can support incident response teams should a successful attack still occur.

Again, these steps apply primarily to phishing-based MFA compromise breaches mentioned previously - but other resources can present a broader picture.

The Right Culture Supports Resilience

Implementing such capabilities takes time. In the meantime, a robust organisational security culture can help fill the gaps. Education and encouraging teams to over-report potential threats are essential steps. Removing the stigma and negative consequences of successful attacks is equally important.

A prime example of this can be found in an article from Cloudflare that covers their successful response to a phishing attack. The company uses the term “paranoid but blame-free” to describe this approach. When three Cloudflare employees correctly suspected they’d fallen for phishing, they alerted the security team immediately, knowing they would not be punished. As a result, the team could block the phishing site three minutes after the attack began and reset the leaked credentials shortly afterwards.

This combination of alertness and consequence-free reporting can go a long way towards the ultimate goal of cyber resilience - making employees at every level of an organisation feel invested in better security.

What More Can We Do To Stay Cyber-Secure?

The approach described above is good practice, but additional layers are needed to further aid organisations wanting to improve their cybersecurity posture. 

Hardware security keys provide next-level security. Businesses can provide physical keys to employees, meaning they don’t have to rely on a digital code to unlock services. Ultimately, this cannot be phished. Hardware security keys leverage cryptography to verify and validate employee identity and prove the legitimacy of the URL login page. This works by only using the original domains of websites to generate the key – something that code–based MFA lacks.

This additional layer of complexity can replace the less secure MFA option that has its flaws. But it also requires employees to fully invest in using the keys and resist reverting to app-based codes when necessary. 

This technology is one that security-conscious organisations need to have on their radar moving forward into 2023 and beyond. 

Attitudes & Behaviours Are As Crucial As protocols & Technologies

There are no certainties in the practice of defining cybersecurity protocols, particularly as the threat landscape evolves at least as fast as, and often faster than, the mitigations we create to defeat it. 

However, as described above, it’s perhaps a combination of a proactive detection and avoidance stance, along with a culture that encourages the right attitudes and behaviours in employees and stakeholders, who are at the front line of these threats, that is most likely to deliver the resilience we all seek

Adrian Odds is Marketing & Innovation Director at CDS

You Might Also Read: 

Blame The Boss For Cyber Attacks:

 

« Security Risks In 5G Mobile
EU Fines Meta $416m »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

Via Resource

Via Resource

Via Resource is a leading provider of information security recruitment and consultancy services.

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Security Audit Systems

Security Audit Systems

Security Audit Systems is a website security specialist providing website security audits and managed web security services.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

BCS Financial

BCS Financial

BCS Financial delivers financial and insurance solutions. Specialty risk products include Cyber and Privacy Liability insurance.

Cyentia Institute

Cyentia Institute

The Cyentia Institute is a research & data science firm with a mission to advance knowledge in the cybersecurity industry.

HancomWITH

HancomWITH

HancomWITH is a World-Leading Mobile and Digital Forensic Research Group. We provide a one-stop forensic service for law firms, audit, and eDiscovery corporations.

Datenschutz Schmidt

Datenschutz Schmidt

Datenschutz Schmidt is a service provider with many years of experience, we support you in complying with numerous data protection guidelines, requirements and laws.

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

Senteon

Senteon

Senteon is a turnkey cybersecurity platform designed to make securing confidential data affordable, understandable, and streamlined for small-to-mid sized businesses and MSPs.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.