Microsoft Urges Organizations To Use MFA

Share post:

Only 22% of Microsoft’s Azure Active Directory (AAD) has implemented “strong identity authentication” as of December 2021.

These include MFA for identity authentication and password-free solutions. The Cyber Signals report means that 78% of AAD customers are exposed to breaches that MFA users are not exposed to.

The small number of companies said to have implemented MFA is partly due to a technical problem in Microsoft’s Office 365. “Basic authentication” is enabled by default in Office 365 and does not support MFA. To mitigate the problem, Microsoft will disable basic authentication by default in October 2022.

In 2021, Microsoft blocked tens of billions of phishing attempts and password rate attacks. According to Microsoft, the attacks originated from state-sponsored actors, including Nobelium.

Failure to implement multifactor authentication endangers organizations, and the inability of organizations to address this risk poses a much greater problem.

Microsoft urges organizations to enable MFA on all end-user accounts and recommends prioritizing it for executives, administrators and other privileged accounts.

For more information, read the original story in ZDNet.



Related articles

Okta’s login flaw exposes users to attack, says Mitiga

According to Mitiga, Okta's login system contains a simple error that could expose its users to future attacks. Users...

Congress committee chair to TikTok: ‘Your platform should be banned’

In response TikTok CEO says company is building a 'firewall' around American user data against fore

Beware of scammers using AI-generated voice clones, FTC warns

The Federal Trade Commission (FTC) issued a consumer alert warning people to be vigilant for calls using voice...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways