How to Prevent Attacks that Bypass MFA Webinar

The usual first step in establishing a zero trust environment is to deploy Multi-Factor Authentication (MFA) to control access to applications and services. MFA is popular because its protections—which combine what users know (such as a password) with something they have (a token or mobile phone)—make it hard for cyber criminals to gain access to applications and data. But MFA’s widespread use of mobile authenticators and push notifications has made MFA environments themselves a target of hackers. Attackers are increasingly using MFA Fatigue (or prompt bombing) to wear down a user’s patience and diligence with repeated fake MFA prompts, only to ultimately pose as a helpful IT support person who needs the user’s credentials to clear those nuisance alerts up. And then they’re in. Fortunately, there are ways to defend against these attacks. MFA authentication is effective—but only if it’s properly protected. Knowing how to outsmart attacks designed to bypass MFA is as critical as deploying MFA itself. Watch this on-demand webinar to hear directly from an in-the-field researcher how to strengthen authentication to prevent attacks that try to bypass MFA. You’ll leave with proven best practices and new knowledge about where your MFA gaps may be—and how to fill them.

Cisco Duo EMEA Intent TA 022024 & Cisco Duo APJC Intent TA 022024


Your privacy is a top concern for us at Knowledge Hub Media. We’ll only use your personal information to provide you with the content, products and/or services you’ve requested from us. By clicking the "Submit" button below, you are confirming that you have carefully read Knowledge Hub Media’s Terms of Use agreement, and Privacy Policy, and agree to be legally bound by all such terms.