Covid brought out something that used to be a luxury, now a common reality, Remote Work. With this became a large security risk that many business unintentionally ended up with. Sending emails without properly handling the data and Authentication issues. We will break down some basic yet highly needed points. Why MFA is needed and Encryption basics.
What is Encryption?
Encryption acts like a secret code, transforming readable data into an unreadable format to thwart unauthorized access. It ensures that intercepted data remains incomprehensible without the decryption key. Here’s how it works:
1. Symmetric Encryption: Utilizes a single key for both encryption and decryption, akin to a shared secret. While efficient, it necessitates secure key management.
2. Asymmetric Encryption: Employs two separate keys – a public key for encryption and a private key for decryption. This approach, commonly used for secure communication like Pretty Good Privacy (PGP) for email encryption, offers heightened security.
Best Practices for Encryption:
• Choose Strong Algorithms: Opt for well-established encryption algorithms such as AES and RSA to ensure robust protection.
• Secure Key Management: Safeguard encryption keys meticulously, considering hardware security modules (HSMs) for key storage.
• End-to-End Encryption: Implement encryption from sender to recipient to prevent unauthorized access during transmission.
Multi-Factor Authentication (MFA): Adding Layers of Security
What is MFA?
MFA mandates users to provide multiple authentication factors during login, thwarting unauthorized access even with compromised passwords. Common MFA factors include:
1. Something You Know: Password or PIN.
2. Something You Have: Smartphone, token, or hardware key.
3. Something You Are: Biometrics like fingerprint or facial recognition.
Best Practices for MFA:
• Vendor Selection: Align MFA solutions with organizational needs and user experience.
• Ease of Use: Prioritize user-friendly MFA methods to drive adoption.
• User Education and Organization-Wide Implementation: Educate users on MFA benefits and usage, and apply MFA consistently across all systems and applications.
• Adaptive MFA and Integration with Single Sign-On (SSO): Utilize adaptive MFA adjusting security based on context like location or device, and integrate MFA with SSO for seamless access.
• Resistance to Attacks: Opt for MFA methods resistant to phishing, brute force, and other attacks, and regularly assess and update MFA strategies.
Real World Examples
At this point you are likely thinking enough of the generic nonsense. Here are some of the platforms I have used and setup. Both are good decent. If you are already utilizing Microsoft products its a no brainer, it will work as seamlessly as a Microsoft product can.. Yes, you know what i am talking about. Duo has its own issues occasionally. Overall, managing the platform is easy. You have the ability to force sync active directory if there is an instant change in an account and you have the ability to customize when authentication is needed.
Duo: Now owned by Cisco Duo is an Multi-factor authentication platform.
“For organizations of all sizes that need to protect sensitive data at scale, Duo is the user-friendly zero trust security platform for all users, all devices and all applications.” – Duo
Microsoft Entra multifactor authentication: Microsoft is in the name on this one. This has some free features, but this will obviously have perks within the Microsoft to Microsoft platform. “Use various MFA methods with Microsoft Entra—such as texts, biometrics, and one-time passcodes—to meet your organization’s needs.”
When MFA Isn’t Enough:
Despite MFA’s significant risk reduction, staying vigilant is crucial. Consider additional security measures like behavioral analytics and continuous monitoring.
By implementing encryption and MFA, organizations fortify their defenses against cyber threats. Remember, protecting data is a shared responsibility, and these tools empower proactive information security measures.
Looking for more Security posts? Don’t Be a Sitting Duck: Secure Your Devices with Firewalls

Leave a Reply
You must be logged in to post a comment.