How to Phish-proof your Multi-Factor Authentication
Jano Van Deventer, Senior Solutions Engineers & Johnny Yeo, Senior Cloud Security Architect, APJ
About this talk
80% of security breaches involve compromised credentials and while password hygiene is culpable in part, even complex, indecipherable passwords developed by algorithms can be problematic. A recent dark web audit revealed 15 billion stolen logins from 100,000 breaches. MFA has been seen as a ‘silver bullet’ against compromised credentials- but is it really?
With the corporate network perimeter becoming a faint memory as a result of the global pandemic, the pressure to protect against breaches is mounting. Employees working outside the corporate network perimeter are exposed to multiple authentication attack vectors such as credential stuffing, password spray and other brute-force mechanisms, local discovery and insider efforts, phishing and social engineering, keystroke logging, malicious proxy and reply campaigns. While MFA has steadily grown popular, it is still a form of perimeter security – which doesn’t solve for today’s ‘work from anywhere’ workforce.
Join this session for a walkthrough of Akamai’s next gen Phish-proof MFA service at the Edge
and to learn more about:
- How today’s standard push MFA services work and how attackers can bypass these
- How the FIDO2 standard prevents MFA bypass attacks – a Phish-proof MFA
Akamai secures and delivers digital experiences for the world’s largest companies. Our intelligent edge platform keeps apps and experiences closer to users — and attacks and threats far away. Top brands globally rely on Akamai so their businesses can be fast, smart, and secure.…