How to Phish-proof your Multi-Factor Authentication

Logo
Presented by

Jano Van Deventer, Senior Solutions Engineers & Johnny Yeo, Senior Cloud Security Architect, APJ

About this talk

80% of security breaches involve compromised credentials and while password hygiene is culpable in part, even complex, indecipherable passwords developed by algorithms can be problematic. A recent dark web audit revealed 15 billion stolen logins from 100,000 breaches. MFA has been seen as a ‘silver bullet’ against compromised credentials- but is it really? With the corporate network perimeter becoming a faint memory as a result of the global pandemic, the pressure to protect against breaches is mounting. Employees working outside the corporate network perimeter are exposed to multiple authentication attack vectors such as credential stuffing, password spray and other brute-force mechanisms, local discovery and insider efforts, phishing and social engineering, keystroke logging, malicious proxy and reply campaigns. While MFA has steadily grown popular, it is still a form of perimeter security – which doesn’t solve for today’s ‘work from anywhere’ workforce. Join this session for a walkthrough of Akamai’s next gen Phish-proof MFA service at the Edge and to learn more about: - How today’s standard push MFA services work and how attackers can bypass these - How the FIDO2 standard prevents MFA bypass attacks – a Phish-proof MFA
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (214)
Subscribers (12081)
Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s cloud computing, security, and content delivery solutions.