The New Reality: Why MFA Alone Won’t Protect Your Business in 2024

30 May 2024
Get in touch

Share on social..

 

Everybody now knows that the original security measure, the simple username-password combination, has proven increasingly inadequate in safeguarding yourself online. Passwords and PINs, once the cornerstone of online security, have become vulnerable to a range of risks when used on their own.

Consequently, alternative authentication methods were needed, and Multi-Factor Authentication (MFA) was born.

These security measures include SMS/email one-time passcodes, authenticator apps, and biometric technologies like touch ID (fingerprints) and face ID on phones.

MFA security should now be a non-negotiable requirement for businesses (and individuals alike). Today, basic MFA is considered a baseline security measure, and businesses that fail to implement it across all their work applications are left exceptionally vulnerable to cyber threats.

Such is its importance, that we here at Lumina will not even offer support to a business that refuses to have MFA.

However, MFA alone is now not enough.

Inevitably, as both technology and cybercriminals have evolved, using the traditional MFA methods mentioned above are no longer enough to keep you safe. Just as the username-password combination eventually needed additional security measures around it, now too does MFA…

Because traditional MFA can now be bypassed:

Methods like time-based one-time passcodes (TOTP), which generate a new security code every 60 seconds via a separate authenticator app, were considered robust due to their dynamic nature.

However, cybercriminals have found ways to bypass these measures, typically with a type of phishing attack referred to as session token theft.

In simpler terms, when you satisfy the MFA requirements and authenticate to a service (like Microsoft etc), that service creates a session token.

That token becomes your passkey for your session and as long as the token remains valid, you will not be prompted to reauthenticate. Anyone in possession of that token can access the services to which the token applies.

Imagine that you have day tickets for Glastonbury.

When you enter the festival venue, you show security your ticket, and in exchange, you’re given a special wristband. Anyone wearing the wristband can access the festival facilities and wander around unchallenged. The wristband could be taken from you without your knowledge and the thief could then also wander around the park unchallenged, as once you have the wristband, security will not ask to see the original tickets.

The Glastonbury tickets are like security measures such as the username-passwords and MFA, and the wristband is like a session token. You satisfy the security requirements (show your tickets) and are granted a session token (a wristband).

Cybercriminals can now exploit businesses by stealing these session tokens to bypass traditional MFA security measures and gain unauthorised access to sensitive company resources. Once inside, this can lead to theft of confidential data and intellectual property, and extortion.

This then poses significant risks to the business and potentially its clients as well.

How can hackers steal a session token?

It all starts with a [very convincing] phishing email.

Here is a step-by-step example of how session token theft can occur with a phishing email and a link to a document:

  1. The user will receive a seemingly genuine phishing email with a link to a document.
  2. They click on it and to view the document, they are prompted to sign into their Microsoft account – the login will look like a legitimate Microsoft login because they are actually logging in to Microsoft…but there is a catch – the attacker is proxying the Microsoft login page via their own web server.
  3. The user will enter their login details that will go via the attacker.
  4. The Microsoft site will then generate an MFA prompt which will be displayed to the user through the proxied session via the attacker.
  5. The user will then use their authenticator app and satisfy the MFA requirements.
  6. The Microsoft server will then generate the session token and send it back to the user (still via the attacker’s proxy).
  7. The attacker will steal a copy of the session token as it passes through.
  8. As the session token is still delivered to the user and the login is completed successfully, no suspicions are raised, and it appears like a genuine login.
  9. As the attacker now has a copy of the session token, they can load it up onto their device at any point and gain access to the user’s Microsoft account without being prompted to re-enter credentials, and therefore be able to access all data the user is authorised to view.

 

This type of phishing attack is often referred to as Adversary-in-the-Middle (AitM) due to the nature of the attacker acting as a ‘middle man’ between the user and Microsoft.

Session token theft allows criminals to bypass MFA because the session token that was stolen was created after the security credentials had been checked. When the session token is loaded up onto the attacker’s device, there are no MFA prompts because the session token will signal that this has already been done.

So how can you stop these types of AitM phishing attacks?

There are approximately 30 billion devices in the world today. Your system needs to know that it really is you, or anyone authorised, that is attempting to access company resources.

New phishing-resistant technologies can now help with this.

Here at Lumina, we are rolling out these new phishing-resistant security measures to all of our clients.

But what are they and how can I begin to upgrade my security?

It can, and should, be argued that the best line of defence is to continually educate your employees with consistent security awareness training.

Humans will always be the last line of defence when it comes to cybersecurity, so consistent security awareness training will never be a bad investment. However, humans are vulnerable to mistakes, even those that are well trained.

It can never be emphasised enough that no one security method is 100% hack proof, therefore cybersecurity always needs to be a multi layered approach to minimise risk. 

What are the new solutions?

There are multiple impactful and cost-effective solutions to combat the now vulnerable traditional MFA methods.

These solutions should be able to be implemented by your IT team.

There are a few security solutions that are phish resistant.

1. Passkeys

Passkeys represent a fundamental shift in how we protect ourselves in the digital world.

Instead of relying on passwords or passcodes that can be stolen or guessed, passkeys link your account to your specific device.

When you set up a passkey on an account:

  1. Two digital ‘keys’ are created – one public, one private
  2. The private key stays securely on your device
  3. The public key sits on the website or app you’re accessing
  4. When logging in, the system checks if these keys match
  5. If they match, you’re logged in, if not then access denied

Only a registered device can successfully login.

Creating a passkey is unlike creating a password. No secret information is ever transmitted during the login exchange, the account is only checking if the public key it has stored matches the private key on your device.

Even if someone tricks you into clicking a malicious link, they can’t access your accounts without your physical device. It’s like having a lock that only works with your specific key.

A passkey cannot be stolen via phishing.

Major tech players like Microsoft, Google, Amazon, and others have made passkeys available to all their users, and other major platforms are following suit.

This isn’t future technology – it’s here now, ready to protect your business from phishing attacks, so that you and your team can click, tap and work from anywhere without the fear of being hacked.

At Lumina Technologies, we became early adopters of passkeys, and we have already begun rolling it out to our clients.

For a comprehensive summary of passkeys and how the technology works, please click here.

2. FIDO Security Keys

FIDO security keys take the passkey measure a step further by having the same technology built into a physical security device. The main difference is that the passkeys are tied to a portable, physical security device that needs to connect to your laptop, computer, or tablet to authenticate your credentials, rather than to the device itself.

FIDO keys offer several advantages:

  • Portable Security: Unlike passkeys that are tied to specific devices, FIDO keys can be used across multiple devices while maintaining the same high level of protection
  • Physical Control: A tangible security device that needs to be physically present for you to login to company systems
  • Simple But Secure: Logging in becomes as simple as inserting the key and tapping it – no complex passwords to remember
  • Universal Compatibility: Works across various platforms and services

For a comprehensive summary of FIDO keys and how they work, please click here.

3. Risk Based Conditional Access

Risk-Based Conditional Access is like a smart security guard for your digital resources.

The IT system will look at factors like where a user is signing in from, what device they’re using, and their recent activity to decide how risky the login is. If it spots something suspicious, like a login from an unfamiliar location, it might ask for extra verification or even block access until it’s sure it’s really the correct user.

Rather than having static policies for everyone, the system is dynamic, and your IT Provider can create rules that require strong authentication methods for sign-ins from unfamiliar locations or devices, while allowing seamless access for low-risk scenarios.

This way, it keeps your business’s data safe by adjusting security measures based on the level of risk it detects, and without compromising user experience with countless MFA prompts and alerts.

4. Token Protection

As mentioned above, token or session cookie theft is now a prevalent hacking method used by cybercriminals to bypass traditional MFA security measures.

Token Protection serves as a vital defence mechanism against this rising threat.

The system can offer Token Protection through cryptographically tying the token to the device that created it. This means that no other device will be able to use that token.

This technology is still in its infancy and, in Microsoft’s case, currently only protects under specific scenarios. As it matures, it will become a significant protection for businesses to use under a multi-layered security approach.

5. Certificate-Based Authentication

Certificate-Based Authentication (CBA) operates similarly to passkeys and token protection, but it uses different technology for encryption and authentication and is centrally managed.

Unlike passkeys, which are typically generated by users themselves, certificate-based authentication involves the issuance of digital certificates by your IT team. These certificates serve to register a user’s device, or the user themselves, ensuring that only registered users or devices are permitted access to business resources. A valid certificate must be presented to successfully complete authentication and can be coupled with other MFA methods.

Certificates may be used to seamlessly connect over a VPN, access wireless networks and authenticate against company resources.

This process adds an extra layer of security to protect against potential threats and unauthorised breaches of sensitive information.

Reactive vs Preventative Measures

While Risk-Based Conditional Access serves as a reactive cybersecurity measure, solutions like Passkeys, Token Protection, Certificate Based Authentication, and ongoing Security Awareness Training represent crucial preventative measures. It’s imperative for businesses to implement a multi-layered approach and have both preventative and reactionary measures to achieve comprehensive security maturity.

Security maturity is a journey

Security maturity is not a destination but a journey.

Establishing a resilient infrastructure in your business, combining technological safeguards and staff education to mitigate the risk of cyberattacks, is a gradual process that requires time and dedication.

You cannot expect it to happen overnight.

Any technology partner promising quick fixes or instant results is like a social media influencer offering a “get rich quick” scheme.

Upgrading security involves implementing additional measures beyond basic Multi-Factor Authentication (MFA).

At Lumina, we have set clear and measurable benchmarks to assess a client’s cybersecurity. This standardised approach enables us to evaluate and score our clients’ security measures accurately, providing a roadmap for continuous improvement and enhancing overall resilience against cyber threats.

Conclusion

What was once deemed secure, such as traditional MFA methods, now serves as a minimum baseline, highlighting the need for advanced security protocols. As technology and cybercrime evolve, new challenges arise, underscoring the importance of adaptive security solutions like those mentioned above.

While there is no 100% hack proof security solution against cyber threats, it is evident that certain measures are more effective than others. As businesses get to grips with this, it’s essential to choose security solutions wisely and pragmatically and remain vigilant in combating emerging threats.

If you would like to explore what your security journey could look like, then please get in touch by clicking the link below:

Click Here to Contact Lumina Technologies Now!

What our customers say

Lumina Technologies have taken the time to understand the requirements of our business and work as our strategic IT partner, enabling us to concentrate on delivering a high quality service to our clients and focus on our growth strategy. They have delivered a 100% cloud solution to our business with no underlying infrastructure costs or maintenance, which gives us scalability for our planned growth. It also means our business critical applications and data are securely accessible from virtually all our user devices. Lumina’s professional approach and strategic expertise is highly valued and their management of our IT – based on their in-depth knowledge, leaves us confident that our systems are available 24×7.

Luke Harrison
Keidan Harrison LLP

Lumina have supported us so well through the difficult circumstances of 2020.  They worked extremely hard to ensure we were able to work remotely and continue to operate our business successfully. The support team are very friendly and knowledgeable, and have excellent response times.

The team have also enhanced our cyber security which is so important in the legal sector, and they continue to provide high quality advice to help us move forward with our IT goals.

Robin Illingworth
Managing Partner, Adams & Remers LLP

The quality of IT Support provided by Lumina Technology is of the highest standard and is complemented by effective client liaison with impressive response times. Trap Oil Group plc has no hesitation in recommending Lumina as a dedicated and specialist group of IT professionals.

Martin David
Technical Director, Trap Oil Group plc

Richard and his team are a real inspiration to anyone who meets them and I have watched Lumina’s growth over the last few years with interest and admiration. Richard has been an amazing supporter of the Hospice of St Francis, being a Gold member of the Corporate Partner Network for almost two years. He takes an active interest in the community and is passionate about his company and his town: nothing is too much trouble, he is always willing to help, to give up his time and to provide business advice when asked. Lumina is an inspiration to any company wanting to set up business in Hertfordshire.

Carolyn Addison
Corporate Fundraising Manager, The Hospice of St Francis

Lumina Technologies Prism Hosted Desktop has allowed our business to centralise our global corporate data, allowing much faster access for all our staff – regardless of their location. We have also been able to simplify and reduce our infrastructure and management overhead. With the new Prism Hosted Desktop solution all staff now have simple and secure access to corporate data using any device they choose. Prism Hosted Desktop has increased the productivity of our staff and given us a single, consistent and familiar experience for all users from any device, in any location, 24/7.

Katherine Roe
Chief Executive Officer, Wentworth Resources PLC

The commercially sensitive and regulated nature of Lambert Energy Advisory’s business requires an IT provider able to maintain the highest levels of integrity and confidentiality, Lumina Technologies has consistently been unimpeachable in this regard over the nine years we have employed them.

Patrick Agar
Lambert Energy Advisory

It has been a great pleasure working with Lumina Technologies over the past two years. They have fully committed to being involved in the local community with volunteering and with professional advice and commitment, helping many local charities along the way. As a growing company it proves that being involved in the local community is helping them attract and retain a talented workforce and I look forward to working with them well into the future.

Cindy Withey
Connect Dacorum

Hawkstone Management Services Ltd is a small company for which IT Outsourcing is realistically the only viable option. Lumina Technologies have successfully performed this role for over fifteen years. They also provide innovative solutions to keep pace with technological progress. I would have no hesitation in recommending Lumina to similar sized businesses.

Stephen Pembury
Hawkstone Management Services Ltd

Charles Douglas Solicitors LLP have been using Lumina Technologies for a number of years now and continue to be impressed by the technical know-how and contemporary knowledge of their senior management, who provide a timely, efficient and friendly service. Whether it is a small issue with one computer, or a strategic IT decision, they maintain a current knowledge of available technologies. Lumina are always at the other end of the phone to help resolve issues and minimise business interference. The technical knowledge of Richard and his senior team means that there has not been a problem that they can’t solve to date. I am sure we will continue to use them in the years to come.

Charles Douglas
Managing Partner, Charles Douglas Solicitors LLP

The team at Lumina Technologies have made the Amoun Travel & Tours office IT transition seamless and problem free. The office set-up has been vastly improved and the IT Support services are flawless. No issue goes unresolved, which is extremely reassuring.

Adam Helmy
Amoun Travel & Tours Ltd

Lumina Technologies has been Salamander Energy plc’s IT provider since start-up in 2005 and has supported us in London during our expansion across operational offices in SE Asia. Their professional approach, strategic advice and close co-operation have been essential in making this a success.

John Bell
Group Technical Director, Salamander Energy plc

Richard and his team at Lumina have provided Perrett Laver Limited with high quality strategic and practical IT Services for over ten years. During this period, Perrett Laver has grown from 10+ colleagues based in London to nearly 100 colleagues located in six offices across the Americas, EMEA and Asia-Pacific. Richard and the Lumina team have not just been responsive to our ‘everyday’ IT needs, but have proactively sought to work with us on developing an infrastructure suitable for the type of operation we are today, and are planning to be months and years down the line. I would not hesitate to recommend Richard, especially for small to medium size business with growth in mind.

Clementine McKinley
COO, Perrett Laver Limited

Society Limited has been supported by Lumina Technologies since our earliest start-up phase. From large logistical challenges like an office move, through to smaller fiddly issues like fixing a faulty e-template, we know we can count on their support and advice. They’ve also been able to engage with us strategically on the challenge of scaling-up our infrastructure as the firm continues to grow and evolve. We always feel confident going to Lumina with a problem, since we know they genuinely care about sorting things out and helping us to get on with our core business.

Simon Lucas
Managing Director, Society Limited

The Vita Group HQ staff have worked with Richard McBarnet and Lumina Technologies for over 9 years, with Lumina providing all our PC, server, phone, and software support. The services have included C-level executives based in London, Manchester, the US, as well as supporting home office IT as well. The service provided and intellectual capabilities are outstanding and we would highly recommend Richard and his Lumina team.

Joe Menendez
CEO, The Vita Group

We worked with Lumina on a GDPR Audit. Richard was knowledgeable and professional throughout, and did the best he could to bring a dry topic to life through lots of real life examples and analogies. We were so impressed with the service Lumina provided and the value we got from partnering with them on this project – we couldn’t recommend them enough.

Holly Cottingham, Vintec Laboratories

We’ve been so well supported by Paige and the Lumina team. They’ve been highly professional, very responsive, friendly, supportive. It’s really validated the decision to engage an IT partner, and we’re glad it’s with Lumina. 

Bruce Storey
Chief Operating Officer, Estu Global Ltd

Discuss your business needs today

Get in touch Schedule a call