According to a study featured in Security Magazine, 70% of consumers prefer a passwordless multi-factor authentication (MFA) login to more traditional usernames and passwords. And it isn’t just consumers, its employees, too. Reading this blog you are probably thinking, — “Duh, of course!” But you’d be surprised at how slow the shift has been. As with all behavioral changes, adopting new policies and approaches to security — especially in an enterprise environment — can take time.
Why do I need an MFA solution? And what kind of MFA solution?
The fact is… MFA solutions aren’t only more convenient but they are also more secure. And specifically, we are seeing public key infrastructure (PKI) emerge as one of the most relevant authentication methods for organizations looking to ditch passwords while adopting more security.
Just imagine you are sitting in the Accounts Payable department at your company when you receive an email from your CEO requesting a large sum of money be sent to a person at a company you’ve never heard of. A little red flag goes up because you don’t recognize the company name but the CEO’s email address looks legit, and this could be urgent so you aren’t sure what to do.
This actually happened at Axiad IDS. Thankfully, we walk the walk and have invested in PKI solutions throughout our organization. Our Accounts Payable team was able to quickly see that the email was not signed with our CEO’s PKI based Digital Signature. This was enough for the employee to confirm the email was not legitimate avoiding a potentially damaging situation for our company.
Why Would an Organization Need PKI?
Consider the top three cyberthreats impacting organizations today — unauthorized access, unsigned applications (malware) and unsecured email — as in the example above. What can help prevent these threats? PKI. PKI enables a trusted environment by authenticating and ensuring the integrity of data and users. Authentication is the process of proving something to be true, genuine or valid.
PKI-based solutions protect against more security threats than other MFA solutions. Specifically:
• PKI-based systems enable authentication and encryption to occur without the need to share highly confidential secret keys.
• The keys in PKI-based systems can be used for encryption functions where only the designated owner of the key can decrypt data. This prevents man-in-the-middle attacks.
• Certificates used in PKI-based systems can be easily revoked (i.e., in the event of a lost or stolen device).
There are a lot of different security options. This said I’ll leave you with a few key thoughts to summarize why you need to take a serious look at PKI for your organization:
• PKI-based security provides additional protection (beyond user authentication): device authentication and secure transactions
• Use PKI when it is critical that every device in your organization is securely identified
• PKI’s data cryptography provides unprecedented data confidentiality and integrity, allowing secure communication of sensitive information (Critical for users accessing sensitive data and where breach would be catastrophic)
Gartner predicts that discovery, provisioning, authentication and data protection will account for half of all security spend in the next five years. If you are ready to explore PKI security solutions for your organization, we’d welcome a conversation. Please feel free to reach out to me direct at: email@example.com.
Jerome Becquart is the Chief Operating Officer at Axiad IDS. Axiad IDS provides trusted identity and access solutions allowing customers to: safely interact online; the freedom to access information from anywhere; and the confidence to fully benefit from today’s digital world.
To consult with an Axiad IDS security expert, feel free to reach out to me at firstname.lastname@example.org.
Join the Axiad IDS community of subscribers and get an email update with the latest news including our monthly blog posts.
Jerome Becqart is a Chief Operating Officer at Axiad IDS. Axiad IDS provides trusted identity and access solutions allowing customers to: safely interact online; the freedom to access information from anywhere; and the confidence to fully benefit from today’s digital world.
To consult with an Axiad IDS security expert, feel free to reach out to me at email@example.com