Remove what-to-do-if-you-must-use-sms
article thumbnail

What To Do if You Must Use SMS

Duo's Security Blog

There are many known risks in life that you simply can’t get rid of altogether. Despite everything we know about the risk of SIM hijacking as a vector of compromise , there’s no way that we can reasonably tell organizations to stop using SMS authentication. Let me know how that works out for you.

article thumbnail

The Problem With One-Time Passcodes

Duo's Security Blog

What are OTPs (one-time passcodes)? Therefore, it is not enough to have MFA turned on, organizations must also deploy secure policies to ensure their users are protected. Therefore, it is not enough to have MFA turned on, organizations must also deploy secure policies to ensure their users are protected.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Start Your Passwordless Journey: Enable Flexible Authentication Options

Duo's Security Blog

If you already read our first post about getting started on your passwordless journey , you’ve already learned about the importance of cataloging the applications in your environment and building a plan around them. However, for 2FA, we do have strong opinions on the security value of different authenticators.

article thumbnail

Defending Against MFA Bypass Attacks with Strong MFA & Trusted Endpoints

Duo's Security Blog

In this blog, we’ll discuss some of the ways you can use MFA and features like Duo’s Trusted Endpoints to protect against MFA bypass attacks. And be sure to catch all the action in Marvel Studios’ The Marvels , in US cinemas November 10th! What is an MFA bypass attack?

article thumbnail

Taking on the Next Generation of Phishing Scams

Google Security

This blog will deep dive into the method of phishing and how it has evolved today. In some cases, attackers phish SMS codes directly, by following a legitimate "one-time passcode" (triggered by the attacker trying to log into the victim's account) with a spoofed message asking the victim to "reply back with the code you just received.”

Phishing 106
article thumbnail

Administrator’s Guide, Part 3: What Makes Passwordless, Dare We Say It, Phish-Proof?

Duo's Security Blog

Part of our Administrator's Guide to Passwordless blog series See the video at the blog post. Yes, it’s a password-less authentication method, greatly streamlining the login experience, and while that’s a great incentive to use passwordless for logging in, it’s not an improvement in authentication security in and of itself.

Phishing 100
article thumbnail

The Implications of the Uber Breach

Security Boulevard

Using this disguise, the perpetrator knows that all they have to do is convince one employee or contractor to share their credentials to gain a foothold into the targeted company's internal network. This tactic is called social engineering and is one of the key methods used in attacks that result in data breaches.