So you've chosen a multi-factor authentication (MFA) solution. Nice! But what's next? Principal Security Strategist Wendy Nather is your guide in this video.
Some organizations limit their usage of MFA to privileged or remote users, thinking that regular users are less vulnerable. But given that people often reuse personal passwords for work applications, only rolling out MFA to some groups can put your data center at risk of phishing and account takeovers.
Plus, deploying MFA is just one piece of the puzzle. Even with MFA, people may still be at risk of getting phished or unintentionally downloading malware. You can mitigate this by ensuring that only healthy devices that meet your standards may access your applications. And it’s not just good for your organization; it also gives people a better experience by offering them more control over when and how they update.