Why is ransomware rampant even when multi-factor authentication is used? | SASIG
Forgotten your password?

Wednesday 27 July 2022, 11am-12noon (BST)

Many businesses believe that by deploying multi-factor authentication (MFA), they are protected against ransomware attacks that leverage phishing and/or stolen credentials.

Unfortunately, MFA solutions that rely on tokens, push notifications, and QR-Codes only protect against brute-force attacks – not phishing attacks.

Ransomware is possible due to stolen credentials or system vulnerabilities. The 2022 Verizon Data Breach Investigations Report (DBIR) highlighted once again that 80% of all attacks utilise phishing and/or stolen credentials. As a result ransomware is rampant today. It increased by 13% in 2022 – the most in the last five years combined.
Lapsus$ ransomware has been successful despite MFA deployment from well-known MFA solutions, so businesses still need further protection against ransomware that leverages phishing and password-based tactics.

Watch now for a deep dive into ransomware, MFA, phishing, and protecting your users, and to discover how malicious actors are still successful despite technical ‘safeguards’.

 
Chaired by

Danny King (info), Managing Director, The SASIG

 
Presented by

Al Lakhani (info), CEO, IDEE
Dencel Baury (info), Senior Principal Consultant, Udo Gärtner

Log in to watch the webinar on demand


Log in here
This website uses cookies, by continuing to use the site you agree to using cookies. Continue