homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured: Solutions for Emerging Risks

    Discover tailored resources that translate emerging threats into actionable strategies

    Risk-Based Solutions

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Deploying Multi Factor Authentication – The What, How, and Why
370x370_Lance-Spitzner.jpg
Lance Spitzner

Deploying Multi Factor Authentication – The What, How, and Why

One of the most effective and proven approaches for strong authentication is multi factor authentication.

April 30, 2024

Weak passwords or poor password use have become one of the primary drivers of data breaches. Cyber attackers are actively targeting and leveraging compromised passwords to not only gain access to organizations, but also quietly pivot and traverse organizations so they can accomplish their goals undetected. As such, organizations are implementing solutions (both technical and educational) to ensure staff use strong passwords in a secure manner. However, in today’s world, strong and secure passwords are no longer enough as they still represent a single point of failure. Even if you have the longest, most complex password in the world, if it’s been compromised, cyber attackers will have full access to your account, system, or data.

One of the most effective and proven approaches for strong authentication is multi factor authentication (MFA). MFA is when multiple factors of authentication are used. That way, if your password is compromised, your account, system, or data are still safe as the other authentication factor(s) still protect you. While MFA has become a popular solution, there is still a great deal of confusion on exactly how it works and its different implementations. As such, I prepared this short explainer to shed some light on MFA and the need to train your workforce on this highly effective approach to strong authentication.

What is MFA and What Are the Different Types?

MFA is considered one of the strongest methods of authentication. While not fool-proof, MFA is one of the most effective steps organizations can take to dramatically reduce the risk of a breach. At its simplest level, MFA requires multiple levels of authentication, like something people know (like a password), something people have (like a mobile device), or something people are (like biometrics). The most common type of MFA is when an individual authenticates with a password (something they know) and then with a unique code sent to their mobile device (something they have). In this case, even if their password is compromised, their account or data are still safe, as the cyber attacker does not have access to the second form of authentication. Unfortunately, that is where the simplicity of MFA stops, and from here, things get a bit complicated.

There are many different terms to describe multi factor authentication. Sometimes it’s called two-step verification, two-factor authentication (2FA), one-time password (OTP), or strong authentication. They all imply the same thing; authentication requiring two or more forms of verification. 

Additionally, there are multiple ways to implement MFA. The list below is illustrative – and by no means exhaustive – of some of the most common methods of MFA, listed in order of least to most secure. What makes the first few options less secure is they are vulnerable to phishing or attacker-in-the-middle attacks where cyber attackers can trick victims out of their password and unique second code. This is why there is a push to adopt phishing-resistant MFA.

  1. SMS / Email: A one-time, unique code is sent to your mobile device via text or email. You then use this unique code in addition to your password to authenticate and log-in. This is one of the most used approaches as it is the easiest for organizations to support. All an individual does is register their mobile phone number or email address with their account, so when they try logging in, moving forward a code is sent to them. However, this approach also has a risk. If someone can redirect or take control of your mobile device’s phone number (through a technique like SIM swapping) then the attacker can intercept your unique code. This method is also vulnerable to cyber attackers using phishing attacks to trick people out of their unique code.
  2. Code Generator: Your mobile device has an authentication mobile app (such as Google or Microsoft Authenticator) that generates unique one-time codes for you. You download the authentication app to your mobile device, enable MFA for your accounts, and then sync the authentication app with each account. These authentication apps can support hundreds of accounts at a time. Another approach is when you are issued a physical token device that generates unique codes. Using a mobile app or physical token to generate codes is considered a bit more secure than SMS codes, as there is no way for cyber attackers to take over your phone number. However, this method is still vulnerable to cyber attackers using phishing attacks to trick or fool people into giving up their unique code.
  3. Push Notification: Some mobile authentication apps (like Microsoft Authenticator) not only generate one-time codes for you, but also receive authentication requests, known as push notifications, from the website you are trying to login to. After receiving the request, you approve it using your device’s biometric security features. This can be more secure if there is no second, unique code for cyber attackers to try and trick people out of. However, if a cyber attacker gains access to your password and tries to login as you, they can keep trying to authenticate until you approve the authentication requests on your mobile phone.
  4. FIDO: This is a physical device that connects to your laptop or computer. This device is registered with the websites you regularly log into. It must be connected to your computer (inserted into a USB port or connected via NFC technology) and will then authenticate you. Yubikey is a common, publicly available example of a physical device supporting the FIDO standard. This approach is considered to be the most secure method of authentication: since there is no unique code or authentication request, there is nothing for cyber attackers to steal from their victims. Many also consider this to be one of the best phishing resistant solutions.
  5. Passkey: This option is like a dedicated FIDO device, but instead of having to support a separate device, your mobile device or your computer becomes the FIDO device. The advantage with passkeys is you get the security of a dedicated FIDO device but with the simplicity of authenticating with a personal device. The disadvantage with passkeys is that it’s not widely supported yet. Learn more about passkeys in this post.

So which approach should your organization support? In most cases, this will be decided by your security or risk management team. In general though, the more secure the approach, the more difficult it can be for your workforce to adopt. Regardless of which method you select, any one of them is better than just passwords alone.

Tips to Deploy MFA

Implementing MFA can be a big, scary change for your workforce. While you may already be familiar with MFA, many in your company will not. As such, a big part of any successful MFA implementation is communicating to people why they should care and how they will benefit, including:

  • Control: It can often feel like cyber attackers have a magic wand to hack into any system they want. MFA allows people to fight back, take control of, and lock down their digital life.
  • Simplicity: MFA can make people’s lives simpler as once it is enabled it does all the work of securing people. When communicating about MFA, keep the concept as simple as possible, for most demographics, you do not need to get too technical. There are so many different terms and variations of MFA that it is common for people to get confused.
  • Personal: Emphasize how MFA is not only a solution at work, but a solution people should implement at home to protect their most important personal accounts (bank, retirement, investments, personal email, etc.).

AI Support 

You can use AI to help create an email that explains MFA’s benefits. Here is a prompt you can consider using:

AI Prompt

I’m the security awareness officer for my company and I’m getting ready to roll-out MFA to my workforce. I want to create an email that explains to employees what MFA is and how they will personally benefit from using it in their work and daily lives. I want them to get excited and become personally engaged. Can you create a short email for me that does this? Make sure the email is not technical and lists three bullet points explaining the benefits.

After AI gives you its answer, remember you can ask AI to modify it. You can ask AI to make the email longer or shorter, more technical, fun, engaging, informal, or act like a pirate, etc. For more on how to make the most of AI, to help you communicate to and train your workforce, check out this blog series on making the most of AI.

Finally, if you are going to train your organization on MFA’s benefits and how to use it, one of the best ways to prepare yourself is to start using it. Set up MFA for your work accounts, but also enable it for your personal accounts like your email and Amazon accounts and any other website that support MFA. This way, you will be more familiar with the technology and become exposed to the different methods and approaches websites use to implement MFA.

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Security Awareness

Related Content

Blog
n2c blog 340x340.png
Security Awareness, Cybersecurity Leadership, Cloud Security, Open-Source Intelligence (OSINT), Industrial Control Systems Security, Digital Forensics, Incident Response & Threat Hunting, Cybersecurity and IT Essentials, Cyber Defense, Offensive Operations, Pen Testing, and Red Teaming
March 13, 2025
A Visual Summary of SANS New2Cyber Summit 2025
Check out these graphic recordings created in real-time throughout the event for SANS New2Cyber Summit 2025
No Headshot Available
Alison Kim
read more
Blog
SSA - Blog - How to Get Your Talk Accepted at the SANS SSA Summit_340 x 340.jpg
Security Awareness
February 26, 2025
How to Get Your Talk Accepted at the SANS SSA Summit
After a decade of chairing events, I’m sharing why certain talks get selected and how to improve your chances of being accepted for future events.
370x370_Lance-Spitzner.jpg
Lance Spitzner
read more
Blog
Security Awareness, Artificial Intelligence (AI), Digital Forensics, Incident Response & Threat Hunting, Cloud Security, Cyber Defense, Offensive Operations, Pen Testing, and Red Teaming, Industrial Control Systems Security, Open-Source Intelligence (OSINT)
December 10, 2024
Top SANS Summit Talks of 2024
This year, SANS hosted 13 Summits from OSINT, ICS, Ransomware, DFIR to HackFest. Here were the top-rated talks of the year.
No Headshot Available
Alison Kim
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn