<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>MFA Archives - Threat Potential</title>
	<atom:link href="https://threatpotential.com/category/mfa/feed/" rel="self" type="application/rss+xml" />
	<link>https://threatpotential.com/category/mfa/</link>
	<description></description>
	<lastBuildDate>Fri, 14 Oct 2022 20:51:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>MFA and Your Small Business</title>
		<link>https://threatpotential.com/mfa-and-your-small-business/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mfa-and-your-small-business</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Tue, 19 Jul 2022 17:03:11 +0000</pubDate>
				<category><![CDATA[MFA]]></category>
		<category><![CDATA[password attacks]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3395</guid>

					<description><![CDATA[<p>Chances are you’ve heard the term MFA (Multi-factor Authentication) thrown around and how you should be using it. In our engagements, we often suggest implementing an MFA solution as a possible remediation for critical/high severity findings. Many clients see this as a very daunting and expensive endeavor, but it doesn’t have to be only for...</p>
<p>The post <a href="https://threatpotential.com/mfa-and-your-small-business/">MFA and Your Small Business</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Chances are you’ve heard the term MFA (Multi-factor Authentication)  thrown around and how you should be using it. In our engagements, we often suggest implementing an MFA solution as a possible remediation for critical/high severity findings. Many clients see this as a very daunting and expensive endeavor, but it doesn’t have to be only for the Fortune 100! Let’s take a look at what MFA is, why it&#8217;s important, and how you can apply it to your small business.</p>



<h3 class="wp-block-heading"><strong>What is MFA?</strong></h3>



<p>MFA is simply using a combination of different methods to prove you are who you say you are. The following methods are combined to do this:</p>



<ul class="wp-block-list"><li><strong>Knowledge</strong> (something you know) – Examples could include a password, passphrase, pin number, or answer to a security question.</li><li><strong>Possession</strong> (something you have) – For example, security token devices, cell phones, and smart-cards.</li><li><strong>Inherence </strong>(something you are) – Traditionally these are bio-metric related such as fingerprint, facial recognition, voice, iris, or even keystroke dynamics.</li></ul>



<p>Keep in mind, for it to be MFA <strong>you must combine at least two separate</strong> methods from different groups. It’s a common mistake that we see in failed MFA implementations and usually results in no increased security.</p>



<h3 class="wp-block-heading"><strong>Why is MFA important?</strong></h3>



<p>Implementing MFA is one of our most recommended solutions to organizations that we do security assessments for. The reason being, we break into a lot of client assets with password attacks that are often exploited by malicious attackers. Most users think “no one would ever target me”, “who would really attempt this password”, or the infamous “I can’t remember all these different passwords, so I’ll make it simple”. It’s easy to slide into this mindset with all the other demanding priorities in our lives but performing online reconnaissance is usually a trivial matter when things exist like LinkedIn, password breach disclosures, and your organizations online footprint.&nbsp; By utilizing previously disclosed breach data or attempting common passwords (Spring2020, &lt;CompanyName&gt;1, Password123) for every user in your organization (aka Password Spraying) it starts to become more real. The fact of the matter is an attacker has to only be right once and you have to be right every time. Do you really trust that ALL your employees are utilizing sophisticated, hard to guess, unique, and lengthy passwords for every resource they authenticate to? We find more often than not that the answer to that question is no.</p>



<p>By implementing an MFA solution this takes the burden off the user to only know, have, or be something that they likely already possess. It drastically increases your businesses security posture by eliminating or reducing the exposure to some popular attack methods.</p>



<h3 class="wp-block-heading"><strong>What are the disadvantages of MFA?</strong></h3>



<p>There&#8217;s no “silver bullets” or all-encompassing solutions that will reduce all your risk to zero, so the following disadvantages should be noted:</p>



<ul class="wp-block-list"><li><strong>Usability</strong> &#8211; As with all thing’s security, there&#8217;s a tightrope walk between usability and protection. If you have a forgetful employee, they could forget their phone/security token. Additionally, they may also get frustrated at having to authenticate multiple times too.</li><li> <strong>Not a foolproof solution &#8211; </strong>Yes, MFA can be circumvented in some instances and this has proven to have happened in the wild. These occurrences are rare but are typically the result of a poorly implemented MFA solution or easily circumvented “fallback” option such email or SMS.</li><li><strong>Can be costly</strong> – MFA doesn’t have to put you in the red but depending on your selection it could be a costly solution.</li></ul>



<h3 class="wp-block-heading"><strong>What’s the best MFA solution for my small business?</strong></h3>



<p>Each organization is different in how they operate, what they are trying to protect, how many users they have, and what resources are available to them so, there is no umbrella response pointing at a specific vendor. Instead you should focus on a few key criteria when finding the right solution for your small business. First being <strong>usability</strong>, you need to figure out what type of information or tool that is suitable for your users. You want each of your employees to have the methods readily available to them such as a cellphone or security token. If your type of business restricts these in certain areas, then that may become an issue. Next criteria, future planning or what we often refer to as <strong>scalability</strong>. You may choose to focus your MFA authentication against your VPN or email first and slowly roll it out to additional applications. Make sure that what you’re choosing will allow for easy integration into all authentication portals that you have in the foreseeable future. Lastly and certainly not least important, it comes down to <strong>cost</strong>. There are solutions that may cost more than you may bring in from your small business, so you want to ensure that you pick one that you can afford. Luckily there are multiple tiers of solutions from a cost perspective. You can choose a costly solution (ex. RSA Tokens), moderately priced (YubiKey/Duo), or even free solutions (Google Authenticator, Authy, LastPass Authenticator, Microsoft Authenticator).</p>



<h3 class="wp-block-heading"><strong>Conclusion</strong></h3>



<p>Even after taking in the above criteria it can be difficult to ensure you&#8217;re using the right solution. In our experience the expensive solutions are not used by small businesses, but rather large ones. Moderately priced options are typically easier to roll out and usually they support more devices. Free ones in many cases are restricted to certain device types or portal applications which can be limiting, but has proven to be satisfactory for many business use cases. If you </p>
<p>The post <a href="https://threatpotential.com/mfa-and-your-small-business/">MFA and Your Small Business</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top 6 ways to improve your penetration test results</title>
		<link>https://threatpotential.com/top-6-ways-to-improve-your-penetration-test-results/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-6-ways-to-improve-your-penetration-test-results</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Thu, 07 Jul 2022 15:07:43 +0000</pubDate>
				<category><![CDATA[MFA]]></category>
		<category><![CDATA[password attacks]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3432</guid>

					<description><![CDATA[<p>Maybe you’re thinking of having a penetration test completed or simply have the jitters of not knowing how the test results will turn out. We get this question often and we’re here to help prepare you for success. So take a look at the top 6 ways to improve your penetration test results. Patch Configuration...</p>
<p>The post <a href="https://threatpotential.com/top-6-ways-to-improve-your-penetration-test-results/">Top 6 ways to improve your penetration test results</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Maybe you’re thinking of having a penetration test completed or simply have the jitters of not knowing how the test results will turn out. We get this question often and we’re here to help prepare you for success. So take a look at the top 6 ways to improve your penetration test results.</p>



<h3 class="wp-block-heading"><strong>Patch</strong></h3>



<p>Configuration management can be difficult but ensure that you know what
exists on your network, remove what you don’t need, and that security patches
have been applied. Applying security patches is imperative to the overall
health of your network and the data that’s held within. However, a
vulnerability scan will do a couple of things for you, inventory the items in
scope and discover common vulnerabilities. Due to the success rate that
outdated versions bring, this is usually an attacker’s first stop.</p>



<h3 class="wp-block-heading"><strong>Change default credentials</strong></h3>



<p>As a penetration tester, attempting default credentials to any system
that we come across is second nature. Failure to change default credentials is
often attributed to simply setting the system up and merely forgetting to
change it afterwards. This is where you can implement some rigor around
processes such as utilizing hardening checklists. Anytime a project,
application, or system is introduced into your environment, you should ensure a
hardening checklist is incorporated in the plan. Often applications and
appliances have more than just one default account so make sure not to forget
those as well.</p>



<h3 class="wp-block-heading"><strong>Implement a password filter</strong></h3>



<p>Password spraying has become a common way to infiltrate organizations. Having
a 10-character minimum, mixed case, numbers, and special character sounds
decent right? Well “Password123!”, “Spring2020!”, “YourCompanyName2020!”
satisfy the requirements but doesn’t reduce the likelihood of an attacker
guessing those credentials. If you force users to rotate their password often
then they are more likely to fall into this trap of using seasons, years, or
simply incrementing numbers to keep up with their password. Be sure to utilize
a tool that will blacklist these type passwords. Don’t forget to not allow them
to use part of their name or username as a password as well!</p>



<h3 class="wp-block-heading"><strong>Implement MFA</strong></h3>



<p>As with anything, multi-factor authentication is not a “hacker proof” solution. However, it does limit a significant number of attacks and increases your overall security posture. The good news is that the MFA realm has become commonplace in most applications and the implementation of those solutions have improved dramatically over the last couple of years. It’s important that you test these as backup options and some weak secondary factors can be easily circumvented. Check out <a href="https://threatpotential.com/mfa-and-your-small-business/">MFA and your business</a> to learn more.</p>



<h3 class="wp-block-heading"><strong>Have separate administrative accounts</strong></h3>



<p>I’ve found that practicing least privilege is seldom found during
penetration testing. However, it has led to a significant amount of domain
takeovers and one of the big eye-openers that our clients often see. Any
administrators in your domain should have separate accounts, one to perform
administrative duties and one as their regular user account. The accounts
should always have separate passwords and the administrative account should
have additional security features applied such as password length, complexity,
and additional monitoring.</p>



<h3 class="wp-block-heading"><strong>Have unique local administrator accounts</strong></h3>



<p>Once an attacker has landed on a machine it’s usually trivial to obtain local passwords or to perform privilege escalation. If your organization is using the same local administrator credential on all your machines, then it makes for moving laterally in your network extremely easy. Doing this manually would be over burdensome for many but luckily there’s a more automated solution and best of all it’s free! Microsoft came out with Local Administrator Password Solution (<a href="https://www.microsoft.com/en-us/download/details.aspx?id=46899">LAPS</a>) to assist in rectification of this issue. It essentially automates the process of changing the passwords for every local administrator account and stores it for you.</p>



<h3 class="wp-block-heading"><strong>Summary</strong></h3>



<p>The goal of your penetration test is to measure the security of your organization and provide actionable steps towards improvement. Even if you don&#8217;t get a sterling report back, it&#8217;s much more important to know what your risks are. Comment below and let us know how you improve your penetration test results!</p>
<p>The post <a href="https://threatpotential.com/top-6-ways-to-improve-your-penetration-test-results/">Top 6 ways to improve your penetration test results</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
