{"id":76278,"date":"2024-04-11T15:40:47","date_gmt":"2024-04-11T07:40:47","guid":{"rendered":"https:\/\/version-2.com\/?p=76278"},"modified":"2024-09-25T17:46:28","modified_gmt":"2024-09-25T09:46:28","slug":"why-mfa-isnt-going-to-save-you","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/04\/why-mfa-isnt-going-to-save-you\/","title":{"rendered":"Why MFA Isn\u2019t Going to Save You"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"76278\" class=\"elementor elementor-76278\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/MFA-Protection.png.webp\" width=\"250\" height=\"250\" \/><\/p><div class=\"fl-module-content fl-node-content\"><h3><strong>Why MFA Isn\u2019t Going to Save You<\/strong><\/h3><p>Think multi-factor authentication (MFA) is iron-clad protection against a data breach? Think again. Hackers are increasingly coming up with clever ways to bypass MFA, from social engineering to elaborate man-in-the-middle attacks. Here are some of the ways bad actors exploit MFAs:<\/p><p><strong>One-Time Passcodes<\/strong><\/p><p>The worst form of two-factor authentication is the one-time passcode (OTP). Not only are the passcode text messages annoying, but they are also not very secure.<\/p><p><strong>SIM Swapping<\/strong><\/p><p>Even if your phone never leaves your pocket, hackers can get control of all your digital life by a technique known as SIM swapping. A Subscriber Identity Module (SIM) is a little card from your phone carrier that stores information to point your phone to the correct cellular network to pick up your correct phone number, and other information to identify it. Nowadays most smartphones use eSIM, which is a digital version of what used to be a physical card. Since it\u2019s now all electronic, all you need to do to change things around is call your cellphone provider. If a hacker gets enough information about you \u2013 often through a phishing text message, or just scraping social media \u2013 they can call your carrier and change your number to their phone. All OTPs will then go to their phone instead of yours, letting them reset accounts and gain access to even more information. Think \u00a0this is unlikely? The <a href=\"https:\/\/www.theverge.com\/2019\/8\/31\/20841448\/jack-dorsey-twitter-hacked-account-sim-swapping\">former CEO of Twitter<\/a> begs to differ.<\/p><p><strong>Provider outage<\/strong><\/p><p>On February 22nd, 2024, US cell provider AT&amp;T <a href=\"https:\/\/www.kvue.com\/article\/news\/nation-world\/att-hit-with-massive-outage\/507-2b35f093-be53-4a92-a23d-dfa98e9393e3\">suffered an outage<\/a> impacting 74,000 subscribers for approximately 12 hours, starting at 3:30am ET. Beyond just a frustrating inconvenience, if you use SMS one-time passcodes for MFA, you were not able to receive messages for the majority of the workday. \u00a0Unfortunately, AT&amp;T is not the only carrier to have issues \u2013 Verizon customers also reported <a href=\"https:\/\/www.themirror.com\/news\/us-news\/verizon-down-mobile-internet-customers-307917\">wide-spread connectivity issues<\/a> for at least 4 hours on January 26th, 2024. T-Mobile users were lucky this go-round, but maybe that\u2019s because they had <a href=\"https:\/\/www.theverge.com\/2023\/2\/14\/23598880\/tmobile-outage-down-no-service-iphone-sos\">their turn<\/a> in February of 2023.<\/p><p><strong>SMISHING<\/strong><\/p><p>This is a silly word for a serious problem; phishing via SMS. Text messages are easy to fake; If your employees are used to getting authentication messages via SMS, it\u2019s that much more likely that they\u2019ll click on a bad link in a moment of carelessness. It happened to <a href=\"https:\/\/www.bitdefender.com\/blog\/hotforsecurity\/activision-confirms-data-breach-exposing-call-of-duty-plans-employee-data\/\">Activision in 2022<\/a>; several employees got fake text messages, and only one person fell for the scam, but that was enough. The victim, in this case, happened to be part of HR, which gave the hackers access to quite a bit of data.<\/p><p><strong>\u00a0Passcodes Are Not Random<\/strong><strong>ly Generated<\/strong><\/p><p>You probably haven\u2019t given much thought to how one-time passcodes are generated, but there is a vague assumption that when a request is made, some server farm somewhere generates a random number and sends it out to you, and then deletes it after you successfully log in. \u00a0That makes sense, but you\u2019d be wrong. The codes are, in fact, stored in a database. \u00a0YX International, a company that serves OTPs for multiple big-name companies like Facebook and Google discovered this database <a href=\"https:\/\/www.techradar.com\/pro\/2fa-security-codes-for-some-of-the-worlds-biggest-companies-were-left-unprotected-online\">was left wide open for anyone to access<\/a>. Thankfully, it was found by a security researcher who alerted the company. Next time, it may be someone with significantly less altruistic motives.\u00a0 We\u2019ve established that OTPs have got to go. Maybe authenticator apps are the solution? They are more secure, they solve many of the issues above like carrier outages and stolen phone numbers, plus phones are protected with biometrics so hackers will need to physically take the phone to do any damage, but they aren\u2019t as safe as you may think.<\/p><p><strong>MFA Fatigue<\/strong><\/p><p>When you use an authenticator app, \u00a0signing in often prompts a push notification to approve or deny access. \u00a0Hackers will bypass this issue by spamming your device with repeated push notifications in the hopes that you\u2019ll approve, either to make it go away, or by accident (we\u2019ve all clicked \u201cNext\u201d when we meant to hit \u201cCancel\u201d after all.) \u00a0<a href=\"https:\/\/www.portnox.com\/blog\/network-security\/nac-and-the-cisco-hack\/\">Cisco was hacked using this method<\/a> after an employee\u2019s Gmail account was compromised. Sometimes there is a social engineering component \u2013as was the case when <a href=\"https:\/\/www.theverge.com\/2022\/9\/16\/23356959\/uber-hack-social-engineering-threats\">Uber was hacked in 2022<\/a>., tThe hacker contacted the owner of the compromised account and pretended to be from Uber\u2019s IT department and asked them to approve the notification.<\/p><p><strong>Attacker-in-the-Middle (<\/strong><strong>AiTM<\/strong><strong>)<\/strong><\/p><p>This attack is somewhat complex, but is also becoming disturbingly more common. An attacker sets up a fake website that mimics a legit one \u2013 such as a banking portal, or an internal portal. They launch a phishing campaign that directs customers and\/or employees to the fake site. They use this site to capture credentials and redirect to a fake MFA site, where the user puts in their real prompt \u2013 which the attacker then passes on to the real website and captures the session cookie while the \u201cfake\u201d site sends the user elsewhere.<\/p><p><img decoding=\"async\" src=\"data:;base64,<svg xmlns='http:\/\/www.w3.org\/2000\/svg' viewBox='0 0 229 229'><\/svg>&#8221; alt=&#8221;How attacker in the middle work&#8221; width=&#8221;229&#8243; height=&#8221;229&#8243; data-lazy-src=&#8221;<a href=\"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/MFA-Diagram.png.webp&#038;#8221\" rel=\"nofollow\">https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/MFA-Diagram.png.webp&#038;#8221<\/a>; \/><noscript><img decoding=\"async\" src=\"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/MFA-Diagram.png.webp\" alt=\"How attacker in the middle work\" width=\"229\" height=\"229\" \/><\/noscript><\/p><p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/08\/detecting-and-mitigating-a-multi-stage-aitm-phishing-and-bec-campaign\/\">Microsoft uncovered a huge AiTM attack<\/a> in 2023 aimed at financial institutions, and <a href=\"https:\/\/www.darkreading.com\/cyber-risk\/reddit-hack-shows-limits-mfa-strengths-security-training\">Reddit was hacked<\/a> that same year using a similar method.<\/p><p><strong>Stolen Cookies<\/strong><\/p><p>There are almost as many varieties of this attack as there are of actual cookies: p<a href=\"http:\/\/ass\/\">ass-the-cookie<\/a>, <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/cookie-poisoning\">cookie poisoning<\/a>, <a href=\"https:\/\/quadrantsec.com\/blog\/5-security-issues-cookies\">cookie tossing<\/a> \u2013 but they all boil down to the same basic concept: Once you log in to something through a web browser, a cookie file is created that tracks your session. Without this, you\u2019d have to log in to each page of a website individually, which would make online banking possibly the most frustrating exercise on the planet. Our ever-expanding portfolio of cloud-based services makes these cookies an extremely attractive target. Successful manipulation of a session cookie completely bypasses MFA. When <a href=\"https:\/\/sec.okta.com\/articles\/2023\/11\/unauthorized-access-oktas-support-case-management-system-root-cause\">Okta was hacked<\/a> in 2023, the hackers went after support files, which just so happened to gather cookie information, and was also a factor in the <a href=\"https:\/\/www.idstrong.com\/sentinel\/hackers-in-the-solarwinds-attack-bypassed-mfa\/\">2020 SolarWinds data breach.<\/a><\/p><p><strong>MFA is Inconvenient<\/strong><\/p><p>You may not think \u00a0inconvenience is relevant to how \u00a0MFA can be bypassed, but consider this: \u00a0 <a href=\"https:\/\/www.spiceworks.com\/it-security\/identity-access-management\/news\/microsoft-targeted-by-russian-state-sponsored-cybercriminals\/#:~:text=Microsoft%20has%20revealed%20that%20Russian,'%20accounts,%20including%20senior%20leadership.\">Microsoft was hacked in November 2023<\/a>, and the hackers used a simple <a href=\"https:\/\/www.portnox.com\/cybersecurity-101\/password-spraying-attack\/\">password spray attack<\/a> to compromise e-mail accounts of top executives which didn\u2019t have MFA turned on because no one wants to \u00a0get a code or approve a push 20 times a day. In response to the Okta hack, the company announced it would be <a href=\"https:\/\/sec.okta.com\/harfiles\">turning on MFA for protected actions in their admin console<\/a>. Why wasn\u2019t it on before? Because it slows you down, interrupts your workflow, and is generally annoying. This creates a tendency not to enable it everywhere, which can leave dangerous gaps in your security.\u00a0 The worst part of all of this is, it\u2019s not terribly difficult or complex to do. <a href=\"https:\/\/www.youtube.com\/watch?v=yildvg4FJLU\">There<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=qbfnejjfYX8\">are<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=sZ22YulJwao\">a<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=LsTN0enXnBo\">lot<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=QSK79bTkBgI\">of<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=SK1zgqaAZ2E\">videos<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=m33VeLRUi4w\">on<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=mREFNbKAwms\">YouTube<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=r59_bAB9Suo\">that<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=auGdUGIqESU\">will<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=u9dBGWVwMMA\">show<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=7yELzLJgPPE\">you<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=oI7dX6DWyTo\">how<\/a> to deploy each of these hacking strategies.<\/p><p><strong>Passwordless Authentication is the Future<\/strong><\/p><p>You may have noticed a recurring theme through these breaches \u2013 some form of phishing and\/or social engineering is effective when you want to bypass MFA. With the thousands of hours of training, fake phishing e-mail tests, and articles published on security best practices, the reality is that passwords are inherently weak, because they still rely on a human element, and the best way to really keep yourself, your data, and your entire organization secure is to remove that element entirely. Switching to certificate-based, passwordless authentication eliminates all of these issues because certificates are encrypted \u2013 they can\u2019t be guessed, phished, or socially engineered. And in a rare win for anything that enhances security, certificates provide a better user experience because there\u2019s no password to remember, no passcode to get from a text message, and no push notifications. Make everyone\u2019s daily digital life easier and more secure with passwordless authentication!\u00a0 Portnox\u2019s <a href=\"http:\/\/%20cloud-native%20nac%20solution\/\">cloud-native NAC solution<\/a> delivers passwordless authentication, endpoint risk monitoring, and 24\/7 compliance enforcement.If you look up NAC solutions on Reddit, you\u2019re likely to encounter frustration, anger, and genuine sadness. That\u2019s how users feel about archaic and cumbersome legacy NAC products. That sorrow ends today. With the Portnox Cloud, powerful and easy-to-use network access control functionality is available at your fingertips.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Why MFA Isn\u2019t Going to Save You Think multi-factor auth [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,1273,61],"tags":[352,423,1272],"class_list":["post-76278","post","type-post","status-publish","format-standard","hentry","category-portnox","category-1273","category-press-release","tag-network","tag-portnox","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why MFA Isn\u2019t Going to Save You - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/mfa-wont-save-you\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why MFA Isn\u2019t Going to Save You - Version 2\" \/>\n<meta property=\"og:description\" content=\"Why MFA Isn\u2019t Going to Save You Think multi-factor auth [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/mfa-wont-save-you\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-11T07:40:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-25T09:46:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/MFA-Protection.png.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/mfa-wont-save-you\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/why-mfa-isnt-going-to-save-you\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Why MFA Isn\u2019t Going to Save You\",\"datePublished\":\"2024-04-11T07:40:47+00:00\",\"dateModified\":\"2024-09-25T09:46:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/why-mfa-isnt-going-to-save-you\\\/\"},\"wordCount\":1366,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/mfa-wont-save-you\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/04\\\/MFA-Protection.png.webp\",\"keywords\":[\"Network\",\"Portnox\",\"2024\"],\"articleSection\":[\"Portnox\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/why-mfa-isnt-going-to-save-you\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/mfa-wont-save-you\\\/\",\"name\":\"Why MFA Isn\u2019t Going to Save You - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/mfa-wont-save-you\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/mfa-wont-save-you\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/04\\\/MFA-Protection.png.webp\",\"datePublished\":\"2024-04-11T07:40:47+00:00\",\"dateModified\":\"2024-09-25T09:46:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/mfa-wont-save-you\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/mfa-wont-save-you\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/mfa-wont-save-you\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/04\\\/MFA-Protection.png.webp\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/04\\\/MFA-Protection.png.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/mfa-wont-save-you\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why MFA Isn\u2019t Going to Save You\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why MFA Isn\u2019t Going to Save You - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/mfa-wont-save-you\/","og_locale":"zh_HK","og_type":"article","og_title":"Why MFA Isn\u2019t Going to Save You - Version 2","og_description":"Why MFA Isn\u2019t Going to Save You Think multi-factor auth [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/mfa-wont-save-you\/","og_site_name":"Version 2","article_published_time":"2024-04-11T07:40:47+00:00","article_modified_time":"2024-09-25T09:46:28+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/MFA-Protection.png.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"8 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/mfa-wont-save-you\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/04\/why-mfa-isnt-going-to-save-you\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Why MFA Isn\u2019t Going to Save You","datePublished":"2024-04-11T07:40:47+00:00","dateModified":"2024-09-25T09:46:28+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/04\/why-mfa-isnt-going-to-save-you\/"},"wordCount":1366,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/mfa-wont-save-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/MFA-Protection.png.webp","keywords":["Network","Portnox","2024"],"articleSection":["Portnox","2024","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/04\/why-mfa-isnt-going-to-save-you\/","url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/mfa-wont-save-you\/","name":"Why MFA Isn\u2019t Going to Save You - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/mfa-wont-save-you\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/mfa-wont-save-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/MFA-Protection.png.webp","datePublished":"2024-04-11T07:40:47+00:00","dateModified":"2024-09-25T09:46:28+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/mfa-wont-save-you\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/cyber-attacks\/mfa-wont-save-you\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/mfa-wont-save-you\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/MFA-Protection.png.webp","contentUrl":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/MFA-Protection.png.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/mfa-wont-save-you\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Why MFA Isn\u2019t Going to Save You"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jQi","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/76278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=76278"}],"version-history":[{"count":5,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/76278\/revisions"}],"predecessor-version":[{"id":76700,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/76278\/revisions\/76700"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=76278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=76278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=76278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}