How to Prevent Attacks that Bypass MFA Webinar

The usual first step in establishing a zero trust environment is to deploy Multi-Factor Authentication (MFA) to control access to applications and services. MFA is popular because its protections—which combine what users know (such as a password) with something they have (a token or mobile phone)—make it hard for cyber criminals to gain access to applications and data. But MFA’s widespread use of mobile authenticators and push notifications has made MFA environments themselves a target of hackers. Attackers are increasingly using MFA Fatigue (or prompt bombing) to wear down a user’s patience and diligence with repeated fake MFA prompts, only to ultimately pose as a helpful IT support person who needs the user’s credentials to clear those nuisance alerts up. And then they’re in. Fortunately, there are ways to defend against these attacks. MFA authentication is effective—but only if it’s properly protected. Knowing how to outsmart attacks designed to bypass MFA is as critical as deploying MFA itself. Watch this on-demand webinar to hear directly from an in-the-field researcher how to strengthen authentication to prevent attacks that try to bypass MFA. You’ll leave with proven best practices and new knowledge about where your MFA gaps may be—and how to fill them.

    Please complete the form below to access this research:

    Business E-mail Address

    First Name

    Last Name


    Job Title

    Job Function

    Company Size





    Zip / Postal Code


    Business Phone Number

    Who are you currently using for an MFA/2FA solution today?

    I would like to receive email communications about products and offerings from Cisco and its Affiliates. I understand I can unsubscribe at any time. Cisco Online Privacy Statement

    Your privacy is a top concern for us at Knowledge Hub Media. We’ll only use your personal information to provide you with the content, products and/or services you’ve requested from us. By entering your contact information and clicking on the “submit” button below, you are confirming that you have carefully read Knowledge Hub Media’s Terms of Use agreement, and Privacy Policy, and agree to be legally bound by all such terms.

    Yes, I agree to the Terms of Use Agreement.

    Yes, I agree to the Privacy Policy.

    The third party vendor sponsoring this content may wish to contact you regarding products and/or services as they relate to this white paper/research. Please check the appropriate boxes below, indicating the ways in which you would like to receive communication from our third party affiliates:

    Yes, I would like to receive communication by email.Yes, I would like to receive communication by telephone.Yes, I would like to receive communication by postal mail.

    Knowledge Hub Media would also like to keep in touch regarding related content, white papers, business/technology research and upcoming events in your area of expertise. Please check the appropriate boxes below to opt-in:

    Yes, Knowledge Hub Media may contact me via email.Yes, Knowledge Hub Media may contact me via telephone.Yes, Knowledge Hub Media may contact me via postal mail.

    You can easily change your communication and consent preferences at any time. Opt-out of receiving communication from Knowledge Hub Media and/or our third party affiliates by easily updating your personally identifiable data and contact preferences here: Update Communication Preferences

    Comments are closed.