Compliance

Today’s “Good Enough MFA” Should Be Phishing-Resistant

October 9, 2024

In today’s world, we can’t escape the daily headlines about data breaches, hacks, and cyberattacks. It’s everywhere we look. And, when it comes to multifactor authentication (MFA), the old saying “I don’t have to be faster than the bear, I just need to be faster than the other guy,” applies. Having MFA can make you feel like you’re the fastest runner, but you can turn into “the other guy” overnight. All it takes is a threat actor buying a new man-in-the-middle (MITM) attack kit or pivoting from one target to an internal, 2-factor (2FA) protected resource to bypass basic MFA. It’s just that easy.

And yet, surprisingly, not every organization has even implemented multi-factor authentication (MFA), and even fewer have adopted phishing-resistant solutions. This makes us wonder:

  1. Why isn’t MFA deployed everywhere?
  2. Why is basic MFA gaining more traction?
  3. Why don’t we see more widespread use of phishing-resistant authentication?

And, now that October is here and we are recognizing Cybersecurity Awareness Month, what better time to dive into these questions and understand why settling for “good enough” (or just simply “turning it on”) when it comes to MFA just isn’t sufficient anymore.

 

The Clear Need for MFA—and Why It’s Underused

We’ve all heard it countless times: passwords alone aren’t enough to protect our digital identities. From blogs to security assessments and regulatory mandates, it’s widely accepted that passwords are a weak link. In fact, an Axiad survey of more than 200 IT professionals found that 93% of organizations are still using passwords at work/for business. So, what’s holding organizations back from widely adopting MFA? There’s two answers to this.

1. Time and Effort Hurdles

One of the biggest roadblocks is the perceived complexity and effort required to implement robust MFA solutions. Many IT teams are stretched thin, constantly being told to “do more with less.” They’re juggling tight budgets, small teams, and an ever-growing list of security threats. While the need for stronger security is crystal clear, IT departments often default to quick, low-effort fixes—like enforcing regular password changes—because they’re easier to roll out.

But here’s the catch: these measures often add frustration for users without significantly improving security. Deploying a comprehensive MFA solution does require time, resources, and training—all things that are often in short supply. So, organizations end up choosing the bare minimum, leaving themselves vulnerable.

2. The Lure of “Good Enough” MFA

For organizations that have mandates to implement MFA, we often see them opting for basic MFA solutions like SMS codes, one-time passwords (OTPs), or push notifications. While these are a step up from passwords alone, they’re not truly phishing-resistant.

Why are these basic options so popular? It’s for the following two reasons:

  1. Cost-Efficiency: They’re often bundled with existing platforms, making them a cost-effective choice that doesn’t require significant additional investment.
  2. Ease of Implementation: IT teams tend to pick MFA options already available within their current systems. It’s the path of least resistance, allowing them to “check the box” for compliance with minimal disruption.

However, these basic MFA methods are far from foolproof. SMS and OTP-based MFA are vulnerable to phishing attacks, SIM swapping, and man-in-the-middle exploits. They’re not the secure solutions many organizations believe them to be.

3. Why Phishing-Resistant MFA Isn’t More Common (Yet)

A smaller group of organizations are starting to embrace phishing-resistant MFA, either due to regulatory requirements or a proactive approach to bolster their security. They recognize that in today’s threat landscape, where attackers are increasingly sophisticated, basic MFA just doesn’t cut it.

 

What’s Holding Back Phishing-Resistant MFA?

So, what’s the holdup? The first is perceived complexity. Solutions like FIDO2/WebAuthn and PKI-based authentication seem daunting to implement. They often require a shift in how organizations handle identity management and may demand significant changes to existing infrastructure.

The other reason is upfront costs and resources. Phishing-resistant methods might come with initial costs and require more advanced integration efforts. For teams already feeling stretched, this can seem like a big hurdle—even if the long-term benefits are substantial.

 

Why Basic MFA Is No Longer Enough

Cybercriminals are constantly evolving their tactics, finding new ways to bypass basic security measures. Relying on “good enough” MFA is a risk that organizations simply can’t afford anymore. Phishing attacks remain one of the most common methods for breaching systems, and basic MFA solutions aren’t equipped to effectively combat these threats.

On the flip side, phishing-resistant MFA offers a much more secure alternative. By using cryptographic methods that ensure both the user and the service authenticate each other—without depending on vulnerable shared secrets like passwords or OTPs—these advanced MFA solutions can significantly reduce the risk of successful attacks.

 

Looking Forward: Moving Beyond “Good Enough” Security

Organizations that are leading the way with phishing-resistant MFA aren’t just ticking a compliance box—they’re future-proofing their systems against tomorrow’s challenges. By investing in stronger authentication methods now, they’re enhancing security, reducing the operational headaches that come with breaches, and offering users a smoother, less frustrating experience.

In a world where security threats are getting more sophisticated every day, settling for “good enough” just doesn’t cut it. The future of identity security lies in embracing phishing-resistant MFA. It’s time for organizations to step up and move beyond basic protections.

Solutions like Axiad Cloud can remove the complexity and provide a turnkey, comprehensive phishing-resistant MFA solution, making it easier than ever to enhance security without overburdening your IT team. By taking this step, you’re not just meeting today’s standards—you’re setting your organization up for a safer, more secure future. To request a demo or to learn more, contact us.

About the author
Michael Thelander, Director of Product Marketing
Michael Thelander
Sr. Director Product Marketing
Axiad Demo

See How Axiad Works

See a comprehensive demo of Axiad and envision how it will revolutionize authentication for you!