Remove strengths-weaknesses-of-mfa-methods-against-cyberattacks-part-2
article thumbnail

Strengths and Weaknesses of MFA Methods Against Cyberattacks: Part 2

Duo's Security Blog

The choice of which authentication methods to use is individual to every organization, but it must be informed by a clear understanding of how these methods defend against common identity threats. In the first part of this three-part blog series , we discussed the various methods available to MFA users.