{"id":6826,"date":"2020-08-12T18:12:48","date_gmt":"2020-08-12T15:12:48","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=6826"},"modified":"2025-08-11T22:28:38","modified_gmt":"2025-08-11T19:28:38","slug":"mfa-myths","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/mfa-myths\/","title":{"rendered":"6 MFA Myths You Still Believe"},"content":{"rendered":"\n<p>MFA or multi-factor authentication by definition is a technology that limits access to a user account unless the user presents two or more pieces of evidence that prove that they are who they claim to be, moreover, the evidence must be of different natures: something they know, something they have or something they are. Overall, the process is regarded as helpful, as it is a solution to many security threats including <a href=\"https:\/\/www.protectimus.com\/blog\/phishing-vishing-smishing-pharming\/\">phishing<\/a>, <a href=\"https:\/\/www.protectimus.com\/blog\/brute-force-attack\/\">brute force<\/a>, <a href=\"https:\/\/www.protectimus.com\/blog\/keylogger\/\">keyloggers<\/a>, some cases of <a href=\"https:\/\/www.protectimus.com\/blog\/social-engineering-why-it-works\/\">social engineering<\/a> and <a href=\"https:\/\/www.protectimus.com\/blog\/mitm-prevention-and-detection\/\">MITM attacks<\/a>. However, some persistent MFA myths make companies hesitant to use it, and we\u2019re ready to debunk some of the most common ones.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>1. Only large companies benefit from using MFA<\/strong><\/h2>\n\n\n\n<p>This misconception doesn\u2019t make sense if you think about it. The size of the company should have nothing to do with the security measures it employs. Even small companies can acquire sensitive information that should be subject to comprehensive control and security.<\/p>\n\n\n\n<p>Furthermore, a company doesn\u2019t need to have a huge staff to implement multifactorial identification. There are two-factor authentication examples that are easy and cheap to carry out, monitor, and maintain. While the downsides of not using MFA authentication can be even more devastating for a small company, a security breach can result in a massive loss of reputation and trust.<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"727\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/43-percent-of-cyber-attacks-target-small-business-1024x727.jpg\" alt=\"43% of cyber attacks target small business according to Verizon 2019 Data Breach Investigation Report\" class=\"wp-image-6849\" style=\"width:600px;height:426px\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/43-percent-of-cyber-attacks-target-small-business-1024x727.jpg 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/43-percent-of-cyber-attacks-target-small-business-300x213.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/43-percent-of-cyber-attacks-target-small-business-768x545.jpg 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/43-percent-of-cyber-attacks-target-small-business-1536x1090.jpg 1536w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/43-percent-of-cyber-attacks-target-small-business-610x433.jpg 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/43-percent-of-cyber-attacks-target-small-business.jpg 1747w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>2. MFA should only be required from privileged users<\/strong><\/h2>\n\n\n\n<p>The idea behind this myth is that only privileged users have access to sensitive data, so they are the only ones that should be required to go through multi-factor authentication. However, this assumption is often wrong as, for example, every company employee has access to some confidential data.<\/p>\n\n\n\n<p>A harmful side of this myth is that cybercriminals often use it to their advantage. They target non-privileged users with <a href=\"https:\/\/www.protectimus.com\/blog\/7-tips-from-phishing-scams\/\">phishing techniques<\/a> or other hacking methods. Then they can use the access gained to move around the corporate network and access private or valuable data with ease.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/remote-work\/\">Remote Work: How to Transition Team to Working From Home During the COVID-19 Pandemic<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3. It is expensive to enable 2FA<\/strong><\/h2>\n\n\n\n<p>This myth stems from the earlier days of 2-step verification when each hardware token cost was around $100, so while it was secure, it wasn\u2019t cheap. Furthermore, they could be lost, rendering the process harder and even more expensive.<\/p>\n\n\n\n<p>Nowadays, the price for hardware tokens <a href=\"https:\/\/www.protectimus.com\/protectimus-two\/\" target=\"_blank\" rel=\"noreferrer noopener\">Protectimus Two<\/a> starts from USD 11,99 and goes down if the amount of order starts from 50 pieces. Moreover, there are much easier and cheaper ways of distributing one-time passwords. For example, it can be done for free through a dedicated <a href=\"https:\/\/www.protectimus.com\/blog\/10-most-popular-2fa-apps-on-google-play\/\">authentication app<\/a> or a <a href=\"https:\/\/www.protectimus.com\/blog\/2fa-chatbots-vs-sms-authentication\/\">chatbot<\/a> in Telegram, Viber, or Facebook. Another thing to consider when calculating the price of MFA is how much you would lose without it in the case of a data breach.<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"1500\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/multi-factor-authentication-how-to-pay-less.jpg\" alt=\"How to pay less for the MFA\" class=\"wp-image-6872\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/multi-factor-authentication-how-to-pay-less.jpg 600w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/multi-factor-authentication-how-to-pay-less-120x300.jpg 120w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/multi-factor-authentication-how-to-pay-less-410x1024.jpg 410w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>4. Two-factor authentication ruins the user experience<\/strong><\/h2>\n\n\n\n<p>Most companies work hard and spend a lot of money to make the user experience as smooth as possible. This is why it might seem annoying to them that just for the sake of implementation of multi-factor authentication solutions users would need to perform an extra task entering a one-time password. While this is true, two-step authentication is becoming more and more common, and users often expect to perform this extra step. Furthermore, you should remember that technology improves the user experience in terms of ensuring their data protection.<\/p>\n\n\n\n<p>For example, one of the best solutions to this problem is intelligent identification. Often called user environment analysis or adaptive authentication, this technology improves the user experience by analyzing the browser version, operating system, and its parameters, window size, presence of certain plugins, and other parameters to identify the user. The two-factor authentication system requests one-time passwords only if the identification by these parameters is not successful. Protectimus MFA service offers adaptive authentication among its <a href=\"https:\/\/www.protectimus.com\/blog\/duo-vs-protectimus-features\/\">features<\/a>.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/the-evolution-of-two-step-authentication-means\/\">The Evolution of Two-Step Authentication<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>5. Multi-factor authentication is challenging to implement<\/strong><\/h2>\n\n\n\n<p>As it is the case with any security measures, even the best MFA programs come with some implementation challenges. However, as technology continues to improve and develop, the implementation process becomes much easier.<\/p>\n\n\n\n<p>For example, Protectimus provides a wide lineup of plugins that allow quick integration with just a few clicks. Among such plugins are those for <a href=\"https:\/\/www.protectimus.com\/winlogon\/\" target=\"_blank\" rel=\"noreferrer noopener\">Windows Logon and Microsoft RDP<\/a>, <a href=\"https:\/\/www.protectimus.com\/owa\/\" target=\"_blank\" rel=\"noreferrer noopener\">OWA<\/a>, <a href=\"https:\/\/www.protectimus.com\/adfs\/\" target=\"_blank\" rel=\"noreferrer noopener\">ADFS<\/a>, and <a href=\"https:\/\/www.protectimus.com\/dspa\/\" target=\"_blank\" rel=\"noreferrer noopener\">Active Directory directly<\/a>, <a href=\"https:\/\/www.protectimus.com\/radius\/\" target=\"_blank\" rel=\"noreferrer noopener\">RADIUS<\/a>, <a href=\"https:\/\/protectimus.com\/guides\/citrix-adc-and-gateway\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Citrix NetScaler (ADC) and XenApp<\/a>, <a href=\"https:\/\/www.protectimus.com\/roundcube\/\" target=\"_blank\" rel=\"noreferrer noopener\">RoundCube<\/a>. The two-factor authentication service is available in-cloud and on-premises.<\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Windows two-factor authentication (2FA) setup | Secure Window login and RDP with MFA || Protectimus\" width=\"838\" height=\"471\" src=\"https:\/\/www.youtube.com\/embed\/xCeQ4jRzXo4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>6. MFA is not a guaranteed safeguard<\/strong><\/h2>\n\n\n\n<p>To be honest, no security solution provides 100% guaranteed safety against all types of security attacks. However, most two-factor authentication examples show that it is not worth time and resources for cybercriminals to break.<\/p>\n\n\n\n<p>Furthermore, there are improvements to the MFA that make it even more impenetrable. For example, <a href=\"https:\/\/www.protectimus.com\/blog\/detailed-information-on-data-signing\/\">CWYS (Confirm What You See) data signing<\/a> protects against many loopholes hackers use to get a one-time password. It uses data from users\u2019 current operations to generate the OTP. This way even if the password is intercepted, the transaction made with it will be flagged as invalid.<\/p>\n\n\n\n<p>However, if you\u2019re still not convinced, you should remember that <a href=\"https:\/\/www.protectimus.com\/blog\/4-reasons-two-factor-authentication-isnt-a-panacea\/\">MFA is not the only security solution<\/a>. Make it a part of your bigger safety system and employ other tactics for additional protection.<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"1500\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/mfa-data-signing-cwys.jpg\" alt=\"What multi-factor authentication (MFA) protects from\" class=\"wp-image-6841\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/mfa-data-signing-cwys.jpg 600w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/mfa-data-signing-cwys-120x300.jpg 120w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/08\/mfa-data-signing-cwys-410x1024.jpg 410w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>In conclusion<\/strong><\/h2>\n\n\n\n<p>Multi-factor authentication is an advantageous way of securing your data. The myth and misconceptions concerning it should not stop you from applying it to your project. If you make a measured and informed decision, you will get a relatively simple, yet secure, cost-effective, and user-friendly system that will protect your data from cybercriminals. So, don\u2019t put it off and provide confidence to your users.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Read more<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/2fa-security-flaws\/\">2FA Security Flaws You Should Know About<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/time-drift-in-totp-hardware-tokens\/\">Time Drift in TOTP Hardware Tokens Explained and Solved<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-solutions-comparison-google-authenticator-vs-protectimus\/\">Two-Factor Authentication Solutions Comparison: Google Authenticator vs. Protectimus<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/active-directory-two-factor-authentication\/\">Active Directory Two-Factor Authentication<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-for-windows\/\">Two-factor authentication for Windows 7, 8, 10<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/owa-two-factor-authentication\/\">How to Add Two-Factor Authentication to Outlook Web App (OWA)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/google-authenticator-backup\/\">How to Backup Google Authenticator or Transfer It to a New Phone<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div>Icons made by <a href=\"https:\/\/www.flaticon.com\/authors\/smashicons\" title=\"Smashicons\">Smashicons<\/a>, <a href=\"https:\/\/www.flaticon.com\/authors\/vitaly-gorbachev\" title=\"Vitaly Gorbachev\">Vitaly Gorbachev<\/a>, <a href=\"http:\/\/www.freepik.com\/\" title=\"Freepik\">Freepik<\/a>, and <a href=\"https:\/\/www.flaticon.com\/authors\/iconixar\" title=\"iconixar\">iconixar<\/a> from <a href=\"https:\/\/www.flaticon.com\/\" title=\"Flaticon\">www.flaticon.com<\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>MFA or multi-factor authentication by definition is a technology that limits access to a user account unless the user presents two or more pieces of evidence that prove that they are who they claim to be, moreover, the evidence must be of different natures: something they know, something they have or something they are. Overall, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5240,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[3,9,15],"tags":[16,12,120,99],"class_list":["post-6826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering","category-protectimus-products","category-rd","tag-2fa","tag-mfa","tag-multifactor-authentication","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=6826"}],"version-history":[{"count":45,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6826\/revisions"}],"predecessor-version":[{"id":9122,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6826\/revisions\/9122"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/5240"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=6826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=6826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=6826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}