¶ºÒõ¹Ý

Best Practices 08-20-2014

Can Multi-Factor Authentication Prevent a Data Breach?

¶ºÒõ¹Ý

Over 40 million customer credit cards and 70 million data files were lost in the Target customer data breach, but the question remains, could multi-factor authentication have prevented the attack?

Brian Krebs on his Krebs on Security blog pointed out that sources have confirmed that the data breach happened because of stolen log in details from a third party contractor working on internal HVAC systems for the organization.

Third party contractors play a bigger role in enterprise organizations as they grow in size and complexity. In order to properly maintain all of the necessary systems, organizations often turn to outside contractors to help maintain, update, patch, and troubleshoot their complex network of systems and resources.

More than Strong Passwords, Enterprises Need Strong Systems

Outside vendors often require the ability to remotely log into an organization's systems to perform routine hardware or software work. To save time on required training or money from extra head count, organizations use temporary contractors or turn to third parties to help manage the growing demands of complex system maintenance.

Some may say that organizations should limit the access of third parties into enterprise systems, but that may not always be a viable solution for enterprise system management.

Other may suggest more complex password requirements. However, a strong password policy doesn't need to be the only line of defense for your systems and network. AddingÌýmultiple layers of security creates extra protection for users and resources in the event of a data breach.

Multi-Factor Means Multi-Layers of Data Security

CouldÌýÌýhave prevented the Target data breach? With the growing number of news headlines related to stolen credentials, it's critical that organizations do more to mitigate the threat of stolen user credentials.

Enterprises expect a growth of nearly 30% in systems requiring digital certificates. This means greater reliance on systems or processes to manage these resources.

Multi-factor authentication adds an extra layer of protection that could prevent scammers, even if they were able to steal valid user credentials. Adding a second layer of IP address restriction, one-time password token, or a client certificate could have been enough to prevent unauthorized access to internal critical systems and is often an effective deterrent toÌýenterprise password theft.

¶ºÒõ¹Ý Managed PKI enablesÌýenterprise users to add multiple levels ofÌýaccess authentication in their certificate management systems.

Better Identity Authentication

It's easy to find cheap SSL Certificates. And even though you can get them for as low as $5, cheap SSL Certificates come at a cost to enterprise data security. Cheap SSL Certificates give encryption, but remove the identity verification step that enterprise Certificate Authorities perform to ensure that a certificate requester really is who they claim to be.

Trusted enterpriseÌýSSL Certificates shouldÌýnever be processed with automated systems, and they should always include human review for security and identity verification. As organizations see their digital certificate needs grow and require more client certificates for their enterprise users, it's key that they use systems that perform authentication in addition to enabling encryption.

For enhanced data security, administratorsÌýmustÌýensure that their organizations:

  • Use best practices forÌýpassword creation and password management
  • Use an effective separation of duties for any system-critical actions or sensitive data security actions
  • EnableÌýmultiple levels of authentication to access system resources to ensure that only the right person interacts with secure systems
  • Monitor the existing system's security for SSL encryption and security vulnerabilities

Organizations large and small could be a target for data thieves. System intrusion isn't even about financial gain anymore; hackers today will target organizations simply because they can. Exposing internal resource or sensitive user information can lead to a serious hit to brand reputation. With the number of resources available and the ease of implementation, there's no reason why enterprise administrators shouldn't implementÌýalternative methods of authentication.

UP NEXT
PKI

3 Surprising Uses of PKI in Big Companies and How to Ensure They Are all Secure

5 Min

Featured Stories

07-03-2024

What is a CA’s Role in delivering digital trust?

11-11-2024

FIPS 140-3 certification unlocked for ¶ºÒõ¹Ý TrustCore SDK

10-31-2024

Announcing the GA release of ¶ºÒõ¹Ý Device Trust Manager