Here’s how cyber criminals try to hack your accounts while you sleep • Blisstech Solutions

Have you ever felt frustrated by the flood of notifications from your multi-factor authentication (MFA) app?

Well, cybercriminals have too. And they’re taking advantage of “MFA fatigue” to try to gain access to your sensitive business data.

MFA is essential for keeping your data secure. It adds an extra layer of security to your apps and accounts by asking you to verify your identity in two or more ways, such as a password and a code sent to your phone.

The constant alerts can be overwhelming though.

Attackers know this and will bombard employees – sometimes in the middle of the night – with a constant stream of MFA notifications. This makes it more likely someone will authenticate a login attempt through frustration, tiredness, or just to get the notifications to stop.

But now there’s a new weapon in the fight against MFA fatigue.

Microsoft Authenticator has introduced number matching as a way of making sure your MFA notification is from the correct login attempt, preventing cyber criminals from taking advantage of notification fatigue.

How does number matching work?

When you receive an MFA notification, the app will display a randomly generated number. You then need to input this number to authenticate the login attempt and prove you’re not a cybercriminal trying to access your business data.

That’s not all. Microsoft Authenticator also allows for biometric authentication, which means you can use your face, fingerprint, or other unique physical features to prove your identity and combat the threat of MFA fatigue attacks.

With these security measures in place, your business can stay ahead of cyber criminals and keep your sensitive data better protected.

If you already use Microsoft Authenticator, number matching is ready to use. Simply make sure your app is up-to-date, and you’ll be protected.

If you use another MFA system and want to look at how to make your security better or easier, we can help. Get in touch.

More Content

Are you losing hours each week setting up video calls?

You could be losing a full-time working week for every member of your team, thanks to the hassle of setting up video calls.

PING, WHOOSH, or BEEP? Now you can decide with Teams

PING, WHOOSH, or BEEP? Now you can decide with Teams

Is the sound of yet another Teams notification about to drive you crazy? A new update will put a stop to that… and it’ll help you prioritize your tasks too. We have all the details here.

HRMC Crown

The tax relief few businesses know about

A quick summary: When you buy certain new equipment (including computers) you can claim 130% capital allowance What that means: If you spend £1,000 on computer equipment, it'll reduce your corporation tax bill as if you had spent £1,300 How long does it last? It will...
Microsoft takes the pain out of updates

Microsoft takes the pain out of updates with checkpoint cumulative updates

Updates are a pain, right? Time consuming and disruptive. Not anymore… Here we tell you how Microsoft’s latest Windows 11 update is making things quicker and easier.

Why you will not be fine on this Cloud9

Fake Flash messages are being used as a cover for a new ‘botnet’ campaign. If you use Google Chrome or Microsoft Edge you could be a target.

How to reopen a closed browser tab thumbnail

Tech Tip: How to quickly reopen a closed browser tab

Welcome to a new Tuesday tech tip video, and it's a really quick, but useful one This video shows how to quickly reopen a closed browser tab in Google Chrome or Edge. The video demonstrates a keyboard shortcut (Ctrl+Shift+T) to restore the last closed tab. I will also...

Tech Tip: How to find the tools you need in Microsoft Office

Welcome to a new Tuesday tech tip video, and it's another speedy, but useful one Are you struggling to find the tools you need in Office applications? Me too! Since Microsoft introduced the ribbon in Office applications, it has become harder to find tools that you...
A woman on a laptop with a shield and lock on the screen

7 ways to secure small business IT

It is hard enough running a business without having to worry about how to ensure your computer systems and data are secure from bad guys.  To help you out, we have put together a list of the top 7 things that you should do to secure your small business IT systems. 1....

How to scan a QR code with your phone

As more venues open up for face to face meetings, some are introducing their own track and trace systems using a QR code that you need to scan with your mobile phone. But how? This video explains how to scan a QR code with your phone so you are not trying to figure it...

Cyber attacks are getting bigger and smarter. Are you vulnerable?

Recently, the biggest ever DDoS attack was reportedly blocked. Worse still, more businesses are being targeted with criminals demanding huge ransoms

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05