Intelligent CISO Issue 51 | Page 64

BUSINESS SURVEILLANCE
edge MFA techniques to ensure their systems are protected . Examples of such MFA solutions include :
• Phishing-resistant options based on WebAuthn
• Continuous authentication that constantly considers the risk of a user
• Adaptive authentication that takes into account user behavior
Failing to keep up in this race can be costly . In the US , the average race with hackers , attacks against MFA are becoming more prevalent . This is because organisations rely on digital solutions to an increasing extent . As a result , the potential payoff from compromising such systems entices attackers to find ways around not only passwords but also MFA . Consequently , cybercriminals have now become quite sophisticated and organisations must repel a barrage of intelligent attacks . In this state of affairs , organisations of all sizes must be equipped with cuttingransomware recovery cost in 2021 was approximately US $ 2.39 million ( including the ransom , business downtime , lost sales , operational costs and legal fees ); this cost was higher ( US $ 5.85 million ) for attacks against sensitive or critical data systems . These costs do not consider business reputation and the price organisations must pay when they fail to uphold their moral responsibility to protect their user ’ s Personal Identifiable Information ( PII ).
64 www . intelligentciso . com