Successfully reported this slideshow.
Your SlideShare is downloading. ×

5 Attack Vectors You Can Protect with MFA

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Loading in …3
×

Check these out next

1 of 1 Ad

5 Attack Vectors You Can Protect with MFA

Download to read offline

Deploying MFA everywhere is a powerful way to secure multiple attack vectors before hackers can breach your organization. This infographic will introduce you to five personas, which represent the five most common ways in which hackers can obtain credentials or gain unauthorized access. Learn more: http://ow.ly/v3tE30lOdCE

Deploying MFA everywhere is a powerful way to secure multiple attack vectors before hackers can breach your organization. This infographic will introduce you to five personas, which represent the five most common ways in which hackers can obtain credentials or gain unauthorized access. Learn more: http://ow.ly/v3tE30lOdCE

Advertisement
Advertisement

More Related Content

More from Ping Identity (20)

Recently uploaded (20)

Advertisement

5 Attack Vectors You Can Protect with MFA

  1. 1. The Eager Employee WITH MFA PERSONA: Phishing/Spear Phishing ATTACK VECTOR: Employees may be overeager to input their login information if confronted with clever phishing emails promising information about rewards programs or bonus payouts. The average phishing attack costs a mid-sized company $ 1.6 MILLION. Phishing attacks are up 1 65% YoY. The Astute Administrator PERSONA: SSH Attacks ATTACK VECTOR: Even your highly trained admins can fall prey to brute force attacks, malware tools and other approaches for compromising their SSH credentials. 35% SSHPsychos is so active in their brute-force attacks that at times they account for up to of all SSH traffic on the internet. The Perilous Partner PERSONA: Many ATTACK VECTOR: Working with partners exponentially expands your attack surface, but it’s hard to enforce and scale your corporate security standards across your partner networks. 29% is uploaded to high-risk partners, exposing many companies to risk of data loss and breaches.3 of data shared with partners The Looted (and unencrypted) Laptop PERSONA: Physical Security ATTACK VECTOR: Locally storing sensitive data on corporate devices is more convenient, but extremely risky. It takes just one stolen device to lose control of data that should never be public. 46% admit they have exposed themselves to laptop security threats, including: Leaving the laptop unattended Leaving the laptop in the car Declining regular security updates Attaching login information to the device Flying with a laptop in checked luggage4 of survey respondents The Careless Consumer PERSONA: Account Takeover ATTACK VECTOR: Credential reuse is still common despite multiple large data breaches. It’s easy for hackers to use those compromised credentials to take over consumer accounts. Modern MFA solutions can help you secure all of these common attack vectors without getting in the way of employees, partners and customers who need access to your resources. 17% Thieves using stolen identity credentials to launch account takeover (ATO) attacks accounted for nearly of all retail login attempts. Read the blog to learn more about deploying MFA everywhere. FIVE ENTERPRISE ATTACK VECTORS CarelessConsumer1 ************* LOG IN 2 5 1 https://cofense.com/wp-content/uploads/2017/11/Enterprise-Phishing-Resiliency-and-Defense-Report-2017.pdf 2 https://securityboulevard.com/2017/10/hackers-are-now-scanning-for-ssh-keys-to-exploit/ 3 https://www.skyhighnetworks.com/cloud-security-blog/target-breach-reveals-risk-of-business-partners/ 4 https://www.alertsec.com/new-data-reveals-that-the-machine-that-holds-the-most-sensitive-data-is-frequently-not-encrypted-raising-security-risks/ 5 https://www.threatmetrix.com/digital-identity-blog/cybercrime/account-takeover-ecommerce-fraud/

×