Here’s how cyber criminals try to hack your accounts while you sleep • Blisstech Solutions

Have you ever felt frustrated by the flood of notifications from your multi-factor authentication (MFA) app?

Well, cybercriminals have too. And they’re taking advantage of “MFA fatigue” to try to gain access to your sensitive business data.

MFA is essential for keeping your data secure. It adds an extra layer of security to your apps and accounts by asking you to verify your identity in two or more ways, such as a password and a code sent to your phone.

The constant alerts can be overwhelming though.

Attackers know this and will bombard employees – sometimes in the middle of the night – with a constant stream of MFA notifications. This makes it more likely someone will authenticate a login attempt through frustration, tiredness, or just to get the notifications to stop.

But now there’s a new weapon in the fight against MFA fatigue.

Microsoft Authenticator has introduced number matching as a way of making sure your MFA notification is from the correct login attempt, preventing cyber criminals from taking advantage of notification fatigue.

How does number matching work?

When you receive an MFA notification, the app will display a randomly generated number. You then need to input this number to authenticate the login attempt and prove you’re not a cybercriminal trying to access your business data.

That’s not all. Microsoft Authenticator also allows for biometric authentication, which means you can use your face, fingerprint, or other unique physical features to prove your identity and combat the threat of MFA fatigue attacks.

With these security measures in place, your business can stay ahead of cyber criminals and keep your sensitive data better protected.

If you already use Microsoft Authenticator, number matching is ready to use. Simply make sure your app is up-to-date, and you’ll be protected.

If you use another MFA system and want to look at how to make your security better or easier, we can help. Get in touch.

More Content

More businesses are proactively investing in cyber security defences

More businesses are investing in cyber security defences

Cyber security: More and more businesses are making the smart business decision to invest in it. Find out why you should join them.

Antivirus Isn’t Enough. Why You Need EDR for Bulletproof Security

In the ancient days of dial-up internet, a simple antivirus program might have kept your computer safe. Today's digital landscape, however, is a minefield of constantly evolving cyber threats. Ransomware, phishing attacks, and zero-day exploits plague businesses and...
Warning: Don’t ignore hardware requirements for Windows 11

Warning: Don’t ignore hardware requirements for Windows 11

Do you love keeping your employees happy by allowing them to work remotely? Or do you think everyone is more productive in the office? Businesses are divided on this right now… here are some important considerations before you decide what’s best for your team.

How to free up disk space on Windows title image

Tech Tip: 3 ways to free up disk space on Windows

Running low on disk space can make your computer run slowly and can cause other problems such as being unable to run applications, install important updates and in some cases cause your computer to crash. This tech tip will show you three ways that you can free up...

Tech Tip: How to name cells in Excel

Welcome to a new Tuesday tech tip video where I will show you how to name cells in Microsoft Excel. Naming cells can make your spreadsheets easier to understand and maintain and help you write more concise and efficient formulas. In the video, I show one way of doing...
Don’t think your business is a target? Think again

Don’t think your business is a target? Think again

Cyber criminals are targeting businesses of all sizes, all the time. And new research shows just how they’re doing it. We tell you how to stay protected.

AI is making phishing scams more dangerous

AI chatbots have taken the world by storm lately. But for all the fun they offer, criminals have been finding ways to use AI for more sinister purposes.

Are your younger employees experiencing ‘tech shame’?

Gen Z and even some Millennial employees are less tech savvy than many employers might expect. It’s an assumption that’s leading to a sense of ‘tech shame’.

Criminals are exploiting AI to create more convincing scams

One of the many cool things about the new wave of Artificial Intelligence tools is their ability to sound convincingly human. AI chatbots can be prompted to generate text that you’d never know was written by a robot. And they can keep producing it – quickly, and with minimal human intervention. So it’s no surprise that cyber criminals have been…

Tech Tip: How to use Pivot Tables in Excel

Welcome to Tuesday's Two Minute Tech Tip where Matt shows you how you can explore your Excel data using the power of Pivot Tables. Pivot Tables are a powerful feature of Excel that allows you to manipulate your flat Excel data to perform calculations and create charts...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05