Urgences 24 sur 7 – (888) 287-5858   Connexion au Portail TitanSupport    Contactez-nous      Blogue

As part of our research on Cybersecurity Perceptions Versus Reality, we developed a survey in collaboration with Serene-risc, a knowledge mobilization network in cybersecurity based in Canada, on the perceptions and practices of cybersecurity professionals. The survey aimed at understanding how defenders perceive specific security measures and whether these measures were implemented in their respective organizations. We then combined the survey results with our penetration testing experience to confront two perspectives: the defenders’ and the pentesters’, the latter standing as proxies for real attackers. This blog post summarizes the results related to multifactor authentication.

Download the complete Cybersecurity Perceptions Versus Reality report, also available in French.

Defenders: Importance versus Implementation

In the survey, respondents were asked about multifactor authentication (MFA), a security measure requiring that a user presents at least two factors, such as: “something that you know” and “something that you have”, before being granted access to a system. When asked, on a scale from 1 to 5, how important multifactor authentication is for the security of their organization, 93.3% said important or very important. When asked whether such a measure was implemented in their organization on their external network, 45% replied yes, 41.7% partially, and 13.3% no, as shown in Figure 1.

Cybersecurity Perceptions Versus Reality

Figure 1 -Multi-Factor Authentication at the External Perimeter

Cybersecurity Perceptions Versus Reality

Figure 2 – Multi-Factor Authentication at the Internal Perimeter

When asked if multi-factor authentication was implemented on their internal network – a measure that could prevent an attacker who has breached a system to pivot internally in the organization to more valuable assets – the response distribution was more conservative, as shown in Figure 2. A total of 23.3% of respondents mentioned that they fully implemented multi-factor authentication on the internal network, 40.8% partially and 35.8% said that they did not implement this security measure.
When asked if multi-factor authentication was implemented on their internal network – a measure that could prevent an attacker who has breached a system to pivot internally in the organization to more valuable assets – the response distribution was more conservative, as shown in Figure 2. A total of 23.3% of respondents mentioned that they fully implemented multi-factor authentication on the internal network, 40.8% partially and 35.8% said that they did not implement this security measure.
Cybersecurity Perceptions Versus Reality

Figure 2 – Multi-Factor Authentication at the Internal Perimeter

Pentesters’ Experience

We then asked our pentesters their perspective and experience with multifactor authentication. According to them, penetration test results show that multi-factor authentication is very efficient at blocking attackers. However, such a measure must be implemented on all externally exposed services, not only the email service, the most common MFA location. Moreover, they mentioned that it is important to note that a secret question is not a second factor: a password and a secret question are both based on a user’s knowledge. Each factor must come from a different authentication vector: a password is what one knows, and an RSA OTP (One Time Password) number is what one has, for example.

Moreover, GoSecure pentesters were surprised that 23% of the respondents said that they implemented multi-factor authentication on the internal network, as they have rarely encountered such security measures in organizations internally. They added that even if critical services have two-factor authentication, day-to-day activities are usually unprotected, such as RDP access to servers or file share access.

Pro Tips on Multifactor Authentication

As a reference for readers, below are some pro tips related to implementing multifactor authentication on corporate networks.

  • Focus on implementing multifactor authentication on all services.
  • SMS-based multi-factor authentication is better than single-factor authentication.
    Keep in mind that for critical services that could be targeted by highly motivated attackers, SMS-based multi-factor authentication could be bypassed using a technique called SIM Swapping.
  • An affordable multi-factor authentication solution is the use of software tokens. These rely on an application on your phone or a computer containing a secret feed instead of relying on a physical token like an RSA key. This is one of the cases where open source solutions exist, but their management and integration are relatively complex. You might consider using a commercial solution if ease of implementation is a concern.
    Be aware that the information sent to the user to enroll the token can sometimes be reused by an attacker if the attacker gets access to it. Thus, it is important to encourage users to destroy the file or email once they have registered their software token.

Conclusion

These findings are part of the Cybersecurity Perceptions Versus Reality report that highlights the key results of a two-year long study that aimed at understanding a disconnect that exists between how defenders perceive the value of their implemented security controls, and the most common attack vectors leveraged by penetration testers acting as potential attackers. The report is available in French and the microdata of the survey is available online.

Détection et réponse gérées et étendues GoSecure TitanMC (MXDR)

Détection et réponse gérées et étendues GoSecure TitanMC (MXDR) Fondation

Gestion des vulnérabilités en tant que service GoSecure TitanMC (VMaaS)

Surveillance des événements liés aux informations de sécurité gérée GoSecure TitanMC (SIEM gérée)

Défense du périmètre gérée GoSecure TitanMC (pare-feu)

Détection et réponse des boîtes de messagerie GoSecure TitanMC (IDR)

Passerelle de messagerie sécurisée GoSecure TitanMC (SEG)

Modélisateur de menaces GoSecure TitanMC

Identity GoSecure TitanMC

Plateforme GoSecure TitanMC

Services de sécurité professionnels de GoSecure

Services de réponse aux incidents

Évaluation de la maturité de la sécurité

Services de confidentialité

Services PCI DSS

Services de piratage éthique

Opérations de sécurité

MicrosoftLogo

GoSecure MXDR pour Microsoft

Visibilité et réponse complètes au sein de votre environnement de sécurité Microsoft

CAS D'UTILISATION

Cyberrisques

Mesures de sécurité basées sur les risques

Sociétés de financement par capitaux propres

Prendre des décisions éclairées

Sécurité des données sensibles

Protéger les informations sensibles

Conformité en matière de cybersécurité

Respecter les obligations réglementaires

Cyberassurance

Une stratégie précieuse de gestion des risques

Rançongiciels

Combattre les rançongiciels grâce à une sécurité innovante

Attaques de type « zero-day »

Arrêter les exploits de type « zero-day » grâce à une protection avancée

Consolider, évoluer et prospérer

Prenez de l'avance et gagnez la course avec la Plateforme GoSecure TitanMC.

24/7 MXDR

Détection et réponse sur les terminaux GoSecure TitanMC (EDR)

Antivirus de nouvelle génération GoSecure TitanMC (NGAV)

Surveillance des événements liés aux informations de sécurité GoSecure TitanMC (SIEM)

Détection et réponse des boîtes de messagerie GoSecure TitanMC (IDR)

Intelligence GoSecure TitanMC

Notre SOC

Défense proactive, 24h/24, 7j/7

À PROPOS DE GOSECURE

GoSecure est un leader et un innovateur reconnu en matière de cybersécurité, pionnier de l'intégration de la détection des menaces au niveau des terminaux, du réseau et des courriels en un seul service de détection et réponse gérées et étendues (MXDR). Depuis plus de 20 ans, GoSecure aide ses clients à mieux comprendre leurs failles en matière de sécurité et à améliorer leurs risques organisationnels ainsi que leur maturité en matière de sécurité grâce aux solutions MXDR et aux services professionnels fournis par l'une des équipes les plus fiables et les plus compétentes de l'industrie.

CALENDRIER D’ÉVÉNEMENTS

DERNIER COMMUNIQUÉ DE PRESSE

BLOGUE GOSECURE

AVIS DE SÉCURITÉ

Urgences 24 sur 7 – (888) 287-5858