{"id":85928,"date":"2024-08-28T11:43:13","date_gmt":"2024-08-28T03:43:13","guid":{"rendered":"https:\/\/version-2.com\/?p=85928"},"modified":"2024-08-22T11:44:53","modified_gmt":"2024-08-22T03:44:53","slug":"mfa-multi-factor-annoyance-why-mfas-days-are-numbered","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/08\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/","title":{"rendered":"MFA = Multi-Factor Annoyance? Why MFA\u2019s Days Are Numbered"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"85928\" class=\"elementor elementor-85928\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/Cybersecurity-Insiders-Outlet-News-logo_Denny-MFA.png\" width=\"1200\" height=\"628\" \/><\/p><div class=\"fl-module-content fl-node-content\"><p><em>This article was originally posted by <a href=\"https:\/\/www.cybersecurity-insiders.com\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/\">Cybersecurity Insider<\/a>.<\/em><\/p><p>Multi-Factor Authentication (MFA) has been the darling of the cybersecurity world for years, touted as the ultimate defense against unauthorized access. But as hackers get craftier, MFA is starting to look more like a speed bump than a fortress. It\u2019s time to pull back the curtain on MFA\u2019s shortcomings and explore why it might not be the superhero we once thought. Enter digital certificates\u2014the unsung heroes poised to revolutionize enterprise security.<\/p><p><strong>The Evolving Threat Landscape<\/strong><\/p><p>MFA relies on a combination of something you know (password), something you have (a mobile device or token), and something you are (biometric data). In theory, this multi-layered approach should significantly reduce the risk of unauthorized access. However, cybercriminals are becoming increasingly sophisticated, employing a variety of tactics to bypass MFA protections.<\/p><p><strong>Common Methods to Bypass MFA<\/strong><\/p><ul><li><strong>Phishing and Social Engineering:<\/strong>\u00a0Attackers often use phishing to trick users into revealing their MFA codes or tokens. By creating fake login pages that mimic legitimate sites, they can capture both passwords and MFA tokens. Social engineering tactics, such as impersonating IT support, also exploit human psychology to obtain MFA credentials.<\/li><li><strong>SIM Swapping:<\/strong>\u00a0This method involves taking control of a victim\u2019s mobile phone number by convincing the phone carrier to transfer the number to a new SIM card. Once the attacker has control of the number, they can intercept SMS-based MFA codes, gaining access to the victim\u2019s accounts.<\/li><li><strong>Man-in-the-Middle (MitM) Attacks:<\/strong>\u00a0In MitM attacks, cybercriminals intercept the communication between the user and the authentication system. By placing themselves in this middle position, they can capture MFA credentials and use them to gain unauthorized access.<\/li><li><strong>Malware:<\/strong>\u00a0Advanced malware can steal MFA tokens directly from a compromised device. Keyloggers, for example, can record keystrokes to capture passwords and OTPs, while other malware might be designed to extract data from authentication apps.<\/li><\/ul><p><strong>Why MFA is Insufficient for Enterprise Security<\/strong><\/p><p>While MFA adds a layer of security, it is not infallible. Enterprises face unique challenges that make relying solely on MFA insufficient:<\/p><ul><li><strong>Scalability Issues:<\/strong>\u00a0Implementing and managing MFA across a large organization can be complex and resource intensive. Ensuring that all employees are consistently using MFA correctly adds to the burden.<\/li><li><strong>User Experience:<\/strong>\u00a0The additional steps required for MFA can frustrate users, leading to potential workarounds or lax security practices. In some cases, users may opt to reuse tokens or bypass MFA when possible.<\/li><li><strong>Integration Challenges:<\/strong>\u00a0Integrating MFA with legacy systems and various applications can be difficult. Not all systems are designed to work seamlessly with MFA, leading to potential security gaps.<\/li><li><strong>Single Point of Failure:<\/strong>\u00a0If an MFA method is compromised, it can still provide a single point of failure. For instance, if an attacker successfully executes a SIM swap, the entire authentication process is undermined.<\/li><\/ul><p><strong>The Promise of Digital Certificates<\/strong><\/p><p>Given the vulnerabilities associated with MFA, enterprises are exploring more robust alternatives. Digital certificates offer a compelling solution, providing a higher level of security for authenticating users to networks and applications.<\/p><p><strong>What Are Digital Certificates?<\/strong><\/p><p>Digital certificates are electronic credentials issued by a trusted authority, known as a Certificate Authority (CA). These certificates use cryptographic keys to verify the identity of the user or device. The public key infrastructure (PKI) underpinning digital certificates ensures that they cannot be easily forged or tampered with.<\/p><p><strong>Advantages of Digital Certificates<\/strong><\/p><ul><li><strong>Enhanced Security:<\/strong>\u00a0Digital certificates eliminate the need for passwords and OTPs, reducing the attack surface for cybercriminals. The cryptographic nature of certificates makes them significantly harder to compromise compared to traditional MFA methods.<\/li><li><strong>Strong Authentication:<\/strong>\u00a0Certificates provide strong, two-way authentication, ensuring that both the user and the server verify each other\u2019s identities. This mutual authentication adds an extra layer of security.<\/li><li><strong>Scalability:<\/strong>\u00a0Digital certificates can be deployed and managed at scale, making them suitable for large enterprises. Automated processes for issuing, renewing, and revoking certificates simplify administration.<\/li><li><strong>User Convenience:<\/strong>\u00a0Once set up, digital certificates provide a seamless user experience. There is no need to enter additional codes or use external devices, streamlining the authentication process.<\/li><\/ul><p><strong>Implementing Digital Certificates in Enterprises<\/strong><\/p><p>To implement digital certificates effectively, enterprises should follow best practices:<\/p><ul><li><strong>Establish a Robust PKI:<\/strong>\u00a0A well-designed PKI is critical for managing digital certificates. This includes setting up CAs, defining policies, and ensuring secure storage of cryptographic keys.<\/li><li><strong>Integration with Existing Systems:<\/strong>\u00a0Digital certificates should be integrated with existing authentication systems, including single sign-on (SSO) solutions and VPNs. Compatibility with various applications ensures comprehensive security coverage.<\/li><li><strong>User Training and Awareness:<\/strong>\u00a0Educating users about the benefits and usage of digital certificates is essential. Clear communication and training programs can help users understand the transition and adhere to security protocols.<\/li><li><strong>Continuous Monitoring and Auditing:<\/strong>\u00a0Regular monitoring and auditing of digital certificate usage can detect anomalies and potential security threats. Automated tools can help identify expired or misconfigured certificates.<\/li><\/ul><p><strong>The Bottom Line: MFA\u2019s Days Are Numbered<\/strong><\/p><p>While MFA has played a crucial role in enhancing security, its limitations are becoming increasingly apparent. As cyber threats continue to evolve, enterprises must look beyond traditional MFA methods to safeguard their digital assets. Digital certificates offer a robust alternative, providing enhanced security, scalability, and user convenience. By embracing digital certificates, enterprises can strengthen their authentication processes and build a more resilient defense against cyberattacks.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>This article was originally posted by Cybersecurity Ins [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,1273,61],"tags":[352,423,1272],"class_list":["post-85928","post","type-post","status-publish","format-standard","hentry","category-portnox","category-1273","category-press-release","tag-network","tag-portnox","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MFA = Multi-Factor Annoyance? Why MFA\u2019s Days Are Numbered - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/contributed-content\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MFA = Multi-Factor Annoyance? Why MFA\u2019s Days Are Numbered - Version 2\" \/>\n<meta property=\"og:description\" content=\"This article was originally posted by Cybersecurity Ins [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/contributed-content\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-28T03:43:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/Cybersecurity-Insiders-Outlet-News-logo_Denny-MFA.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"MFA = Multi-Factor Annoyance? Why MFA\u2019s Days Are Numbered\",\"datePublished\":\"2024-08-28T03:43:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\\\/\"},\"wordCount\":892,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Cybersecurity-Insiders-Outlet-News-logo_Denny-MFA.png\",\"keywords\":[\"Network\",\"Portnox\",\"2024\"],\"articleSection\":[\"Portnox\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\\\/\",\"name\":\"MFA = Multi-Factor Annoyance? Why MFA\u2019s Days Are Numbered - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Cybersecurity-Insiders-Outlet-News-logo_Denny-MFA.png\",\"datePublished\":\"2024-08-28T03:43:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Cybersecurity-Insiders-Outlet-News-logo_Denny-MFA.png\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Cybersecurity-Insiders-Outlet-News-logo_Denny-MFA.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/contributed-content\\\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MFA = Multi-Factor Annoyance? Why MFA\u2019s Days Are Numbered\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MFA = Multi-Factor Annoyance? Why MFA\u2019s Days Are Numbered - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/contributed-content\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/","og_locale":"zh_HK","og_type":"article","og_title":"MFA = Multi-Factor Annoyance? Why MFA\u2019s Days Are Numbered - Version 2","og_description":"This article was originally posted by Cybersecurity Ins [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/contributed-content\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/","og_site_name":"Version 2","article_published_time":"2024-08-28T03:43:13+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/Cybersecurity-Insiders-Outlet-News-logo_Denny-MFA.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/08\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"MFA = Multi-Factor Annoyance? Why MFA\u2019s Days Are Numbered","datePublished":"2024-08-28T03:43:13+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/08\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/"},"wordCount":892,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/Cybersecurity-Insiders-Outlet-News-logo_Denny-MFA.png","keywords":["Network","Portnox","2024"],"articleSection":["Portnox","2024","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/08\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/","url":"https:\/\/www.portnox.com\/blog\/contributed-content\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/","name":"MFA = Multi-Factor Annoyance? Why MFA\u2019s Days Are Numbered - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/Cybersecurity-Insiders-Outlet-News-logo_Denny-MFA.png","datePublished":"2024-08-28T03:43:13+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/contributed-content\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/Cybersecurity-Insiders-Outlet-News-logo_Denny-MFA.png","contentUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/Cybersecurity-Insiders-Outlet-News-logo_Denny-MFA.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/contributed-content\/mfa-multi-factor-annoyance-why-mfas-days-are-numbered\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"MFA = Multi-Factor Annoyance? Why MFA\u2019s Days Are Numbered"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-mlW","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/85928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=85928"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/85928\/revisions"}],"predecessor-version":[{"id":85935,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/85928\/revisions\/85935"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=85928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=85928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=85928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}