SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsOne of the most effective and proven approaches for strong authentication is multi factor authentication.
Weak passwords or poor password use have become one of the primary drivers of data breaches. Cyber attackers are actively targeting and leveraging compromised passwords to not only gain access to organizations, but also quietly pivot and traverse organizations so they can accomplish their goals undetected. As such, organizations are implementing solutions (both technical and educational) to ensure staff use strong passwords in a secure manner. However, in today’s world, strong and secure passwords are no longer enough as they still represent a single point of failure. Even if you have the longest, most complex password in the world, if it’s been compromised, cyber attackers will have full access to your account, system, or data.
One of the most effective and proven approaches for strong authentication is multi factor authentication (MFA). MFA is when multiple factors of authentication are used. That way, if your password is compromised, your account, system, or data are still safe as the other authentication factor(s) still protect you. While MFA has become a popular solution, there is still a great deal of confusion on exactly how it works and its different implementations. As such, I prepared this short explainer to shed some light on MFA and the need to train your workforce on this highly effective approach to strong authentication.
MFA is considered one of the strongest methods of authentication. While not fool-proof, MFA is one of the most effective steps organizations can take to dramatically reduce the risk of a breach. At its simplest level, MFA requires multiple levels of authentication, like something people know (like a password), something people have (like a mobile device), or something people are (like biometrics). The most common type of MFA is when an individual authenticates with a password (something they know) and then with a unique code sent to their mobile device (something they have). In this case, even if their password is compromised, their account or data are still safe, as the cyber attacker does not have access to the second form of authentication. Unfortunately, that is where the simplicity of MFA stops, and from here, things get a bit complicated.
There are many different terms to describe multi factor authentication. Sometimes it’s called two-step verification, two-factor authentication (2FA), one-time password (OTP), or strong authentication. They all imply the same thing; authentication requiring two or more forms of verification.
Additionally, there are multiple ways to implement MFA. The list below is illustrative – and by no means exhaustive – of some of the most common methods of MFA, listed in order of least to most secure. What makes the first few options less secure is they are vulnerable to phishing or attacker-in-the-middle attacks where cyber attackers can trick victims out of their password and unique second code. This is why there is a push to adopt phishing-resistant MFA.
So which approach should your organization support? In most cases, this will be decided by your security or risk management team. In general though, the more secure the approach, the more difficult it can be for your workforce to adopt. Regardless of which method you select, any one of them is better than just passwords alone.
Implementing MFA can be a big, scary change for your workforce. While you may already be familiar with MFA, many in your company will not. As such, a big part of any successful MFA implementation is communicating to people why they should care and how they will benefit, including:
You can use AI to help create an email that explains MFA’s benefits. Here is a prompt you can consider using:
AI Prompt
I’m the security awareness officer for my company and I’m getting ready to roll-out MFA to my workforce. I want to create an email that explains to employees what MFA is and how they will personally benefit from using it in their work and daily lives. I want them to get excited and become personally engaged. Can you create a short email for me that does this? Make sure the email is not technical and lists three bullet points explaining the benefits.
After AI gives you its answer, remember you can ask AI to modify it. You can ask AI to make the email longer or shorter, more technical, fun, engaging, informal, or act like a pirate, etc. For more on how to make the most of AI, to help you communicate to and train your workforce, check out this blog series on making the most of AI.
Finally, if you are going to train your organization on MFA’s benefits and how to use it, one of the best ways to prepare yourself is to start using it. Set up MFA for your work accounts, but also enable it for your personal accounts like your email and Amazon accounts and any other website that support MFA. This way, you will be more familiar with the technology and become exposed to the different methods and approaches websites use to implement MFA.
Lance revolutionized cyber defense by founding the Honeynet Project. Over the past 25 years, he has helped 350+ organizations worldwide build resilient security cultures, transforming human risk management into a cornerstone of modern cybersecurity.
Read more about Lance Spitzner