Here’s how cyber criminals try to hack your accounts while you sleep

Have you ever felt frustrated by the flood of notifications from your multi-factor authentication (MFA) app?

Well, cyber criminals have too. And they’re taking advantage of “MFA fatigue” to try to gain access to your sensitive business data.

MFA is essential for keeping your data secure. It adds an extra layer of security to your apps and accounts by asking you to verify your identity in two or more ways, such as a password and a code sent to your phone.

The constant alerts can be overwhelming though.

Attackers know this and will bombard employees – sometimes in the middle of the night – with a constant stream of MFA notifications. Which makes it more likely someone will authenticate a login attempt through frustration, tiredness, or just to get the notifications to stop.

But now there’s a new weapon in the fight against MFA fatigue.

Microsoft Authenticator has introduced number matching as a way of making sure your MFA notification is from the correct login attempt, preventing cyber criminals from taking advantage of notification fatigue.

How does number matching work?

When you receive an MFA notification, the app will display a randomly generated number. You then need to input this number to authenticate the login attempt and prove you’re not a cyber criminal trying to access your business data.

That’s not all. Microsoft Authenticator also allows for biometric authentication, which means you can use your face, fingerprint, or other unique physical features to prove your identity and combat the threat of MFA fatigue attacks.

With these security measures in place, your business can stay ahead of cyber criminals and keep your sensitive data better protected.

If you already use Microsoft Authenticator, number matching is ready to use. Simply make sure your app is up-to-date, and you’ll be protected.

If you use another MFA system and want to look at how to make your security better or easier, we can help. Get in touch.

Published with permission from Your Tech Updates.

Share this article?

RELATED POSTS

How to break up with your IT support provider

Important: Protect your business from digital fraud

Important: Protect your business from digital fraud

Digital fraud isn’t on the rise. It’s evolving. Fast. Scammers are using smarter tools, more convincing messages and pressure tactics designed to make even careful people slip up. These are the simple habits that could stop your team from falling for them…
Prepare your business for more refined cyberthreats

Prepare your business for more refined cyberthreats

Cyberthreats don’t look the way they used to. They’re quieter now. Smarter. Harder to spot until it’s too late. If you think today’s attackers are still using old school tactics, you might be missing the real danger already moving in the background…
Scroll to Top