How Multifactor Authentication Can Help Protect Against Cyber Threats

Travelers umbrella logo.
By Travelers
3 minutes

Cyber crime is an ongoing threat for organizations, with incidents such as ransomware attacks, fraudulent sign-in attempts and breaches due to stolen credentials continuing to rise. And no organization is safe – cyber criminals target businesses large and small. According to the Federal Bureau of Investigation, internet crime and reported losses continue to affect businesses of all sizes.

Now more than ever, organizations need to take all necessary precautions to secure their systems and data. Passwords alone are not enough. Multifactor authentication (MFA) can help stop cyber attacks in their tracks, blocking 99.9% of account-compromising attacks.1

What Is MFA?

MFA is a security method that requires the use of two or more authentication factors to verify a user’s identity. MFA is often used to verify users who are accessing an organization’s network or their email remotely, or accessing privileged or administrative accounts. MFA provides greater assurance that users are who they say they are and helps keep data and business systems safe even if one set of credentials (such as a user ID and password) has been compromised.

How Does MFA Work?

To verify a user’s identity prior to granting access, MFA uses authentication factors that fall into at least two of three categories:

  1. Knowledge – Something only the user knows, such as a password, PIN or answers to personal security questions.
  2. Possession – Something only the user has, such as their smartphone, a smart card or a software token.
  3. Biometric – Something that is unique to the user, such as a fingerprint or retinal scan.

For example, when logging in to an organization’s network, the first authentication factor may be the user’s standard username and password credentials. The second factor may include a one-time passcode sent to the user’s smartphone, which can only be accessed by using a third factor, such as a matching fingerprint.

As a general rule, the more authentication factors required, the more robust the security. MFA also requires that these authentication factors be independent of one another. If one factor grants access to another factor, the integrity of the structure could be compromised.

Why Should You Use MFA in Your Business?

The average cost of a data breach continues to rise which is a concerning factor for organizations of all sizes. MFA can be a strong component of an organization’s security strategy for many reasons:

  • Limits digital credential theft. MFA makes it more difficult for criminals to steal digital credentials and limits the usefulness of the stolen credentials. Even if a hacker gains access to your employees’ usernames and passwords, they’re unlikely to have access to the additional factors required to log in, such as the user’s fingerprint or the smartphone to which a one-time passcode has been sent.
  • Strengthens existing systems. Other cybersecurity solutions, such as firewalls and anti-virus protection, are only as strong as the authentication steps that protect them. MFA helps make existing security systems stronger.
  • Protects high-value targets. Administrative and executive accounts are high-value targets for hackers seeking to gain broader access to a network – and the sensitive business information contained therein. MFA can be used specifically to protect these accounts.
  • Deters cyber exploits. Cyber crime involves more than stealing information. With MFA, you can also deter hackers from destroying data, deploying ransomware, changing programs and transmitting spam or malicious code throughout an organization’s systems.
  • Secures email access. Intruders often use email access to carry out cyber schemes against businesses, their clients and customers. MFA can help minimize the risk of criminals gaining remote access to a user’s corporate email account.

How Can Your Business Get Started with MFA?

An organization should be clear about what they want to protect and know that there is flexibility regarding which authentication factors can be used without unduly inconveniencing their users.

An extra layer of security in the form of MFA is crucial, but the options can vary from one solution to the next. To learn how a business can implement MFA and increase their cyber defenses, Travelers offers its CyberRisk policyholders access to a one-hour consultation with an HCL Technologies Security Coach, who can provide much-needed expertise and help pave the way for a stronger cybersecurity program.

Travelers can help you build a strong security program with flexible insurance options and policyholder benefits that includes pre-breach services and access to other cybersecurity resources.

Contact your local independent agent to learn more.

illustration of person sitting in front of a laptop computer being cyber secure with a hacker in the corner

Top Stories

2023 Travelers Risk Index: Cyber

The Travelers Risk Index provides an annual snapshot of risk viewpoints from over 1,200 business decision makers across the country.

Related Products & Services

We understand the complexity of cyber threats and have cyber liability insurance solutions to help protect your business assets.

Policies that fit your unique responsibilities and exposures – whether your business is a private, public, nonprofit or financial institution.

More Prepare & Prevent

Cybersecurity Training for Employees

Cybersecurity training for employees can help keep your business safe from cyberattacks. Get tips on employee cybersecurity training from Travelers.

Employees being trained on cyber security.

More Prepare & Prevent

How to Help Protect Your Intellectual Property

Registering intellectual property (IP) and using written agreements can help protect intellectual property.

Man on computer protecting intellectual property.

More Prepare & Prevent

How to Protect Your Company from Business Email Hacks

Business email compromise is a growing threat to companies, which unknowingly grant a hacker access to their business email account that can be used for wire transfer fraud.

Picture of a laptop with an urgent notification, Gone in a Keystroke: Inside a Business Email Hack.