CISA Advises Strongly Against Single Factor Authentication

Share post:

The US Cybersecurity and Infrastructure Security Agency (CISA) recently added single-factor authentication (SFA) to its list of cybersecurity bad practices.

The organization warns that the practice is “exceptionally risky” when used for remote authentication or logging into administrative authorizations because attackers can use the low-security method to gain access to systems. allowing passwords to easily be stolen or guessed by various techniques.

Switching to multi-factor authentication (MFA) helps makes it more difficult for threat actors to carry out a successful attack.\

Commenting on the latest announcement, CISA said: “The use of single-factor authentication for remote or administrative access to systems supporting the operation of Critical Infrastructure and National Critical Functions (NCF) is dangerous and significantly elevates risk to national security, national economic security, and national public health and safety.”

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Massive Credential Stuffing attack exploits home devices

Okta, a leading authentication service, is raising alarms over a massive credential-stuffing attack that cleverly disguises fraudulent login...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways