How likely is an organization to have misconfigured multi-factor authentication (MFA) settings?

Very likely6%

Likely42%

Somewhat likely22%

Somewhat unlikely15%

Unlikely11%

Very unlikely2%

Unsure

584 PARTICIPANTS
3.6k viewscircle icon1 Upvotecircle icon1 Comment
Sort by:
CTO in Software4 years ago

The "basics" of MFA are usually straightforward and not very challenging to get right. The challenging part is what happens next, I often refer to it as "operationalizing" security - driving adoption and awareness, providing training, controlling configuration drift, etc.

Content you might like

Weak multi-factor authentication (MFA)29%

Errors in assigning the correct access permissions42%

Out-of-date software55%

Weak security controls on VPN22%

Lack of strong password policies22%

Unprotected cloud services36%

Susceptibility to phishing attempts21%

Insufficient endpoint detection & response (EDR) capabilities12%

Other (please list in the comments)

View Results

Hardware-based security (TPM)21%

Public key infrastructure (PKI) for cert-based identity57%

Identity onboarding at manufacturer15%

Integration with the cloud5%

View Results