Should We Be Rethinking Multifactor Authentication?

KEY POINTS:

KEY POINTS:

  • Attacks exploiting multifactor authentication are on the rise.
  • Using MFA fatigue, attackers successfully breached Uber and Okta.
  • Security measures like authentication with biometrics and passwordless logins mitigate risk.

Power in Passwordless: Rethinking Multifactor Authentication After Increase in Attacks

It’s easy to imagine – your work email prompts a sign-in approval on your phone before you have access. It seems secure, right? One day, you get a prompt while off work and are not logged in to your email. You deny it. It comes up again and again. Each time, you’re careful to deny the request. Let’s say the notifications continue – relentlessly. In this attack, it’s common for users to become careless and accidentally give attackers an opening. The technique is called MFA fatigue or prompt bombing (Tech Target), and there’s been an influx of these attacks.

“Professionals are abuzz on one topic – the failure of multifactor authentication or MFA, as it is commonly known,” said Aaron Painter, CEO, Nametag. MFA has been a part of directives and advice in improving security for digital account access for the last few years. “Recent security breaches at a host of companies, most recently at Uber, have pointed to the rise of what’s known as MFA fatigue,” said Painter.

There are a handful of security measures available to mitigate these attacks. Consider a safety net that locks accounts with multiple attempts within a short time. This measure prevents users from experiencing fatigue. Alternatively, professionals suggest one-time passwords. This step is a higher assurance of factors. “It turns out that adding more factors of authentication to passwords isn’t the right answer. Perhaps the solution is that we need better factors,” said Painter.

Microsoft recommends passwordless solutions, which effectively defend against this and more advanced adversary-in-the-middle attacks (Bleeping Computer). Another source, TechTarget, also suggests adopting a passwordless solution. “Passwordless authentication removes passwords from the process, which can drastically reduce risk.” Other passwordless solutions use biometrics for authentication. Apple and Google’s Face ID exemplifies biometric confirmation. “Plus, passwordless authentication reduces friction and improves UX. It also increases the efficiency of IT and security operations, reducing the amount of time and effort spent handling password resets and account lockouts” (TechTarget).

“The recent Lapsis attack and other critical vulnerabilities like those of Print Nightmare have brought warnings even from the likes of the FBI regarding state-sponsored threat actors using exploits like multifactor authentication,” said Painter. Organizations of all sizes are vulnerable to these attacks, including Okta and Uber (CSO). Like most security measures, cyber attackers eventually find a way around them. Pivoting measures to the latest technology and tactics keeps your company safe and secure.

 

Follow us on social media for the latest updates in B2B!

Image

Latest

personal branding
Personal Branding Now Drives B2B Success, Customer Trust, and Competitive Advantage
December 5, 2025

Personal branding has rapidly shifted from a “nice-to-have” to a strategic imperative in B2B marketing, reshaping how companies communicate, differentiate, and build trust. As industries evolve and professionals take on more dynamic, multi-stream careers, visibility and authenticity have become critical assets. Key findings from the Edelman + LinkedIn Thought Leadership Impact Report show that…

Read More
IT
Real-World IT Practices Are Streamlining AV Deployments and Raising the Bar for Consistency
December 4, 2025

For years, the AV industry has discussed the long-anticipated convergence with IT—but that shift is no longer theoretical. With cloud adoption accelerating, hybrid work normalizing, and organizations rebuilding digital infrastructure after years of rapid change, AV systems now sit squarely on the IT backbone. In fact, the majority of newly upgraded conference rooms require network-centric…

Read More
ROI
ROI Case Study
December 3, 2025

Denials are no longer a slow leak in the revenue cycle—they’re a fast-moving, rule-shifting game controlled by payers, and hospitals that don’t model denial patterns in real time end up budgeting around losses they could have prevented. PayerWatch’s four-digit, client-verified ROI in 2024 shows what happens when a hospital stops reacting claim by…

Read More
coverage
Clip 2 – Fighting for Coverage: One Patient’s Story
December 3, 2025

Health insurers love to advertise themselves as guardians of care, but the real story often begins when a patient’s life no longer fits neatly into a spreadsheet. In oncology especially, “coverage” isn’t a bureaucratic checkbox—it’s the fragile bridge between a treatment that finally works and a relapse that can undo years of grit…

Read More