{"id":91707,"date":"2024-10-10T15:47:29","date_gmt":"2024-10-10T07:47:29","guid":{"rendered":"https:\/\/version-2.com\/?p=91707"},"modified":"2024-10-02T15:51:05","modified_gmt":"2024-10-02T07:51:05","slug":"secure-authentication-put-your-cybersecurity-helmet-on","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/10\/secure-authentication-put-your-cybersecurity-helmet-on\/","title":{"rendered":"Secure Authentication: Put your cybersecurity helmet on"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"91707\" class=\"elementor elementor-91707\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div id=\"content-c10959002\" class=\"frame frame-default frame-type-text frame-layout-0\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/authentication-250x250.png\" alt=\"\" width=\"250\" height=\"250\" \/><\/div><div id=\"content-c10959003\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div><div class=\"image-wrapper\">\u00a0<\/div><div class=\"meta\"><span class=\"author\">Roman Cuprik<\/span><time class=\"date hidden-to-sm\">30 Sep 2024<\/time><\/div><div id=\"content-c10964906\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em>Multi-factor authentication is a necessity, and now it\u2019s easy to deploy.\u00a0<\/em><\/p><p>In ice hockey, where players collide with each other at <a href=\"https:\/\/www.encyclopedia.com\/sports\/sports-fitness-recreation-and-leisure-magazines\/ice-hockey-forces-check\" target=\"_blank\" rel=\"noopener\">20 mph<\/a> (30 km\/h) and take shots at speeds of up to about <a href=\"https:\/\/www.researchgate.net\/figure\/Velocity-of-the-hand-the-stick-and-the-puck-when-the-stick-struck-the-puck-directly_fig3_322093518\" target=\"_blank\" rel=\"noopener\">100 mph<\/a> (161km\/h), it is hard to imagine that players competed without wearing helmets until the late 1970s. Since then, this single piece of safety gear has significantly <a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC6822215\/\" target=\"_blank\" rel=\"noopener\">reduced injuries<\/a> and <a href=\"https:\/\/bjsm.bmj.com\/content\/51\/11\/A71.1\" target=\"_blank\" rel=\"noopener\">prolonged careers<\/a> of professional players.<\/p><p>This example shows that sometimes the solution to a painful problem can be quite simple. The same is true for authentication, which is <a href=\"https:\/\/www.statista.com\/statistics\/1441180\/cyber-breach-as-a-result-of-authentication-weaknesses-worldwide\/\" target=\"_blank\" rel=\"noopener\">among the favorite cyberattack vectors<\/a> for adversaries. Relevant data confirms <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/08\/20\/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks\/\" target=\"_blank\" rel=\"noopener\">again <\/a>and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/01\/26\/2023-identity-security-trends-and-solutions-from-microsoft\/\" target=\"_blank\" rel=\"noopener\">again <\/a>that having a single password, no matter how strong, is not enough anymore. An additional layer of protection \u2013 multi-factor authentication (MFA) \u2013 significantly decreases the likelihood of successful attacks on user credentials.<\/p><p><a href=\"https:\/\/www.eset.com\/fileadmin\/ESET\/US\/B2B_Resource_centre\/whitepapers\/eset-article-cyber-hygiene-fa.pdf\" target=\"_blank\" rel=\"noopener\">Well-developed processes<\/a> to secure employees\u2019 authentication, in combination with password hygiene, are essential parts of any prevention-first approach that aims to stop attacks before they can do any harm to a business. In pursuit of this strategy, ESET incorporated its cloud-based MFA solution<a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/multi-factor-authentication\/\" target=\"_blank\" rel=\"noopener\"> ESET Secure Authentication<\/a> into <a href=\"https:\/\/help.eset.com\/protect_hub\/public\/en-US\/\" target=\"_blank\" rel=\"noopener\">ESET PROTECT Hub<\/a>, a new unified point of entry to the <a href=\"https:\/\/www.eset.com\/int\/business\/small-and-medium\/\" target=\"_blank\" rel=\"noopener\">ESET PROTECT Platform<\/a> serving businesses that include MSPs with user, license, and hierarchy management tools.<\/p><\/div><div id=\"content-c10964907\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Aiming for the corners<\/h3><\/header><p>Just like ice hockey players tend to aim for the top corners of the net because of a high success rate, cybercriminals know that credentials are among the most vulnerable layers of businesses\u2019 defense because of the human element involved.<\/p><p>For example, despite <a href=\"https:\/\/internal.statista.com\/statistics\/1147391\/online-adults-identify-cybersecurity-terms\/\" target=\"_blank\" rel=\"noopener\">increasing global cybersecurity awareness<\/a> among adults online, the password\u00a0 \u201c123456\u201d remains the <a href=\"https:\/\/www.weforum.org\/agenda\/2024\/07\/popular-passwords-cybercrime-digital-safety\/#:~:text=This%20is%20the%20fifth%20year,common%20passwords%20from%202019%2D2022.\" target=\"_blank\" rel=\"noopener\">most-used credential<\/a>.<\/p><p>And it\u2019s not only a problem for the general public. Poor password hygiene is also observed among IT admins. Digging through more than 1.8 million pages identified as admin portals in 2023 revealed that <a href=\"https:\/\/www.darkreading.com\/application-security\/the-most-popular-it-admin-password-is-totally-depressing\" target=\"_blank\" rel=\"noopener\">40,000 of them<\/a> used &#8220;admin&#8221; as their password.<\/p><p>Knowing this, it is no surprise that the latest <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/2024-dbir-data-breach-investigations-report.pdf\" target=\"_blank\" rel=\"noopener\">Verizon 2024 Data Breach Investigations Report <\/a>found that 77% of basic web application attacks involved stolen credentials, 21% of them were the result of brute force (usually easily guessable passwords), and 13% of those attacks exploited vulnerabilities.<\/p><p>While businesses struggle with password laziness observed among their employees, adversaries improve their techniques to fool even those who are more tech savvy and vigilant. We can already see nefarious technical developments like <a href=\"https:\/\/www.darkreading.com\/endpoint-security\/perception-point-report-finds-that-advanced-phishing-attacks-grew-by-356-in-2022\" target=\"_blank\" rel=\"noopener\">AI-driven phishing<\/a> or powerful high-end machines able to guess random six-characters-long passwords <a href=\"https:\/\/www.hivesystems.com\/blog\/are-your-passwords-in-the-green?utm_source=password-form\" target=\"_blank\" rel=\"noopener\">in a single day<\/a>, despite the improved hashing methods used. Not to mention that users of older hashing methods can get breached instantly.<\/p><\/div><div id=\"content-c10964908\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">The importance of an MFA helmet<\/h3><\/header><p>Luckily, most attackers targeting credentials behave like desperate players shooting pucks from their side across the whole rink toward their opponent\u2019s net and hoping for the best. \u201dSpraying and praying\u201d tactics are still prevalent among various cyberattacks; this is clearly demonstrated by <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/01\/26\/2023-identity-security-trends-and-solutions-from-microsoft\/\" target=\"_blank\" rel=\"noopener\">Microsoft data<\/a> published in 2023. Simple, cheap, and easily mass-produced password attacks still dominate the game. As a result, Microsoft deflects more than 1,000 password attacks per second(!) in its systems. Interestingly, they have noticed that more than 99.9% of accounts compromised didn\u2019t have multi-factor authentication enabled.<\/p><p>Google <a href=\"https:\/\/security.googleblog.com\/2019\/05\/new-research-how-effective-is-basic.html\" target=\"_blank\" rel=\"noopener\">found similar results<\/a> in its older 2019 survey showing that adding just an another simple step of verification can block up to 100% of automated bots, 99% of bulk phishing attacks, and 66% of targeted attacks.<\/p><p>Last but not least: multiple or additional factors of authentication are now a standard compliance requirement, just like the helmet has become compulsory in ice hockey.<\/p><p><strong>Automated attacks targeting credentials:<\/strong><\/p><p><strong>Phishing \u2013<\/strong> Fraudulent messages, emails, or calls luring targeted users into giving their account details and passwords. Using the latest technology, including AI, it is increasingly easy to mass-produce these attacks and at the same time make them more believable.<\/p><p><strong>Password spraying \u2013 <\/strong>Trying the most-used passwords, such as the word \u201cpassword\u201d or \u201c1234,\u201d against a huge number of accounts.<\/p><p><strong>Dictionary attack \u2013<\/strong> Trying a list of passwords derived from a dictionary of words against a valid account.<\/p><p><strong>Brute force \u2013 <\/strong>An automated attack against a single account using all possible combinations for a password.<\/p><p><strong>Breach replay or credential stuffing \u2013<\/strong> pervasive reuse of exposed credentials from previous data breaches against many accounts.<\/p><\/div><div id=\"content-c10964909\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Get protected with no sweat<\/h3><\/header><p>Available in higher tiers of the <a href=\"https:\/\/www.eset.com\/int\/business\/small-and-medium\/\" target=\"_blank\" rel=\"noopener\">ESET PROTECT<\/a> solution for businesses, <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/multi-factor-authentication\/\" target=\"_blank\" rel=\"noopener\">ESET Secure Authentication<\/a> provides an additional layer of security against common credential attacks.<\/p><p>It protects both regular employees and IT admins logging into business ecosystems, mitigates the risk of stolen and compromised credentials, keeps attackers from accessing corporate data, and helps businesses with cybersecurity compliance.<\/p><p>And the best part: reducing complexity, smooth installation and operation. The deployment takes around 10 minutes in the cloud; ESET Secure Authentication doesn\u2019t need dedicated hardware \u2013 it&#8217;s cloud-based, easily scalable, and, what is more, ESET oversees maintenance and upgrades.<\/p><\/div><div id=\"content-c10964910\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><img decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/ESA_infographics_for_blog.png\" alt=\"\" width=\"850\" height=\"479\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c10964912\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Stay safe with ESET<\/h3><\/header><p>Exploiting valid accounts is still the path of least resistance for cybercriminals, according to <a href=\"https:\/\/www.ibm.com\/account\/reg\/us-en\/signup?formid=urx-52629\" target=\"_blank\" rel=\"noopener\">IBM X-Force Threat Intelligence Index 2024<\/a>, and despite effective protection being available,<a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2024\/cyber-security-breaches-survey-2024\" target=\"_blank\" rel=\"noopener\"> many companies<\/a> still don\u2019t use it.<\/p><p>Witnessing rapid-fire strikes from cybercriminals against business accounts every second, it\u2019s time to \u201cput a helmet on\u201d. With <a href=\"https:\/\/www.eset.com\/int\/business\/small-and-medium\/\" target=\"_blank\" rel=\"noopener\">ESET PROTECT<\/a>, businesses can not only enjoy multilayered and AI-powered protection against all kinds of sophisticated attacks, but also take a proactive, prevention-first approach and easily deploy MFA to defend their precious accounts against massive automated attacks.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00a0Roman Cuprik30 Sep 2024 Multi-factor authentication is [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[41,1272],"class_list":["post-91707","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-eset","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure Authentication: Put your cybersecurity helmet on - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Authentication: Put your cybersecurity helmet on - Version 2\" \/>\n<meta property=\"og:description\" content=\"\u00a0Roman Cuprik30 Sep 2024 Multi-factor authentication is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-10T07:47:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/authentication-250x250.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/secure-authentication-put-your-cybersecurity-helmet-on\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/secure-authentication-put-your-cybersecurity-helmet-on\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Secure Authentication: Put your cybersecurity helmet on\",\"datePublished\":\"2024-10-10T07:47:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/secure-authentication-put-your-cybersecurity-helmet-on\\\/\"},\"wordCount\":891,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/secure-authentication-put-your-cybersecurity-helmet-on\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/authentication-250x250.png\",\"keywords\":[\"ESET\",\"2024\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/secure-authentication-put-your-cybersecurity-helmet-on\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/secure-authentication-put-your-cybersecurity-helmet-on\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/secure-authentication-put-your-cybersecurity-helmet-on\\\/\",\"name\":\"Secure Authentication: Put your cybersecurity helmet on - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/secure-authentication-put-your-cybersecurity-helmet-on\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/secure-authentication-put-your-cybersecurity-helmet-on\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/authentication-250x250.png\",\"datePublished\":\"2024-10-10T07:47:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/secure-authentication-put-your-cybersecurity-helmet-on\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/secure-authentication-put-your-cybersecurity-helmet-on\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/secure-authentication-put-your-cybersecurity-helmet-on\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/authentication-250x250.png\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/authentication-250x250.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/secure-authentication-put-your-cybersecurity-helmet-on\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Authentication: Put your cybersecurity helmet on\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure Authentication: Put your cybersecurity helmet on - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/","og_locale":"zh_HK","og_type":"article","og_title":"Secure Authentication: Put your cybersecurity helmet on - Version 2","og_description":"\u00a0Roman Cuprik30 Sep 2024 Multi-factor authentication is [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/","og_site_name":"Version 2","article_published_time":"2024-10-10T07:47:29+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/authentication-250x250.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"6 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/10\/secure-authentication-put-your-cybersecurity-helmet-on\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Secure Authentication: Put your cybersecurity helmet on","datePublished":"2024-10-10T07:47:29+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/10\/secure-authentication-put-your-cybersecurity-helmet-on\/"},"wordCount":891,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/authentication-250x250.png","keywords":["ESET","2024"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/10\/secure-authentication-put-your-cybersecurity-helmet-on\/","url":"https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/","name":"Secure Authentication: Put your cybersecurity helmet on - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/authentication-250x250.png","datePublished":"2024-10-10T07:47:29+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/authentication-250x250.png","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/authentication-250x250.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Secure Authentication: Put your cybersecurity helmet on"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-nR9","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/91707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=91707"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/91707\/revisions"}],"predecessor-version":[{"id":91714,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/91707\/revisions\/91714"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=91707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=91707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=91707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}