Understanding MFA Fatigue: Why Cybercriminals Are Exploiting Human Behaviour

The common maxim in cybersecurity is that the industry is always on the back foot. While cybersecurity practitioners build higher walls, adversaries are busy creating taller ladders. It’s the nature of the beast. A prime example is multi-factor authentication (MFA), a security process that requires users to verify their identity in two or more ways, […]

The post Understanding MFA Fatigue: Why Cybercriminals Are Exploiting Human Behaviour appeared first on IT Security Guru.

This article has been indexed from IT Security Guru

Read the original article: