top of page

The Monthly Cyber Resilience Series: MFA Done Right: Practical Setup and Common Pitfalls

  • Feb 22
  • 2 min read

If passwords are the weakest link, Multi-Factor Authentication (MFA) is the simplest and most effective reinforcement.


MFA means proving your identity using at least two different factors:

  • Something you know (password)

  • Something you have (phone, hardware key)

  • Something you are (biometrics)


Even if a password is stolen through phishing or a data breach, MFA can stop the attacker from accessing the account.


However, not all MFA is equal.


Many organisations introduce MFA and assume the problem is solved. In reality, poorly implemented MFA can still be bypassed - especially when:

  • SMS codes are intercepted

  • Users approve push notifications without checking

  • Attackers trick users into real-time login approval

  • Backup codes are stored insecurely


MFA is powerful - but only when implemented thoughtfully.


The objective is not just to “turn it on”, but to deploy it in a way that meaningfully reduces risk.


Practical Implementation & Common Mistakes


1. Choose the Right MFA Method


Not all methods offer the same protection:


Stronger options:

  • Hardware security keys (FIDO2/WebAuthn)

  • Passkeys

  • Authenticator apps with number matching


Weaker options (still better than nothing):

  • SMS codes

  • Email verification codes


Where possible, avoid SMS as the primary factor due to SIM-swap risks.


2. Protect Against MFA Fatigue


“MFA fatigue” attacks rely on sending repeated login approval prompts until the user clicks “Approve” just to stop notifications.


Mitigation:

  • Enable number matching

  • Limit repeated push attempts

  • Alert security teams to unusual login patterns


Users must be trained: never approve a login they did not initiate.


3. Secure Recovery Processes


Account recovery is often the weakest link.


Ensure:

  • Backup codes are stored securely

  • Recovery emails are protected with MFA

  • Helpdesk verification processes are strict


Attackers frequently target password reset mechanisms rather than the login process itself.


4. Apply MFA Everywhere It Matters


Prioritise:

  • Email accounts

  • Administrator accounts

  • Remote access systems

  • Cloud and SaaS platforms

  • Financial systems


Email is especially critical - compromise there often enables takeover of other accounts.


5. Monitor and Measure


Implementation should include monitoring:

  • Failed login attempts

  • MFA bypass attempts

  • Suspicious geographic logins

  • High-risk authentication events


Security is not deployment - it is continuous management.


6. The Strategic Shift


Effective MFA implementation moves organisations from:

“We trust the password.”

to

“We verify identity continuously.”

MFA significantly reduces the risk of account compromise - but only when paired with:

  • Strong identity governance

  • Least privilege access

  • User awareness


In identity security, layering matters.


Next month, we will focus on endpoint hygiene - because even strong authentication cannot protect a compromised device.

Comments


Badge.png

t. +387 33 448 280

e. csec_official@csec.ba

a. Gradačačka 114

    Sarajevo, Bosnia and Herzegovina

White BA logo.png

The establishment of CSEC has been supported by the UK Government.

Subscribe to Our Newsletter

Thanks for submitting!

Follow Us On:

  • Facebook
  • LinkedIn
  • Instagram
  • Twitter
bottom of page