SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsToday is the perfect opportunity to talk about strong passwords.
Today, May 5, is World Password Day—the perfect opportunity to talk about one of my favorite topics, strong passwords. Weak passwords, or poor password use, has become a primary driver for breaches. Cyber attackers are actively targeting and leveraging compromised passwords not only to gain access to organizations, but to quietly pivot and traverse organizations so they can accomplish their goals undetected. As such, organizations are implementing solutions—both technical and training—to ensure staff are not only using strong passwords but are doing so in a secure manner. However, in today’s world secure passwords are no longer enough because they still represent a single point of failure. Even if you have the longest, most secure password in the world, if that password is compromised cyber attackers have full access to your account, system, and data.
One of the most effective and proven approaches for strong authentication is something called Multi-Factor Authentication, or MFA for short. MFA is when multiple factors of authentication are used before access is granted. This way, if your password is compromised, your account, system, and data are still safe as the other factor or factors still protect you. MFA is becoming a popular solution, but there can be a great deal of confusion about exactly how MFA works as well as the different implementations of it. As such, here’s a short explainer to better prepare you to train your workforce on this highly effective approach to strong authentication.
MFA, an acronym for Multi-Factor Authentication, is considered one of the strongest methods of authentication. Microsoft estimates that MFA defeats 99% of authentication-based attacks. While not foolproof, MFA is one of the most effective steps organizations can take to dramatically reduce the risk of a breach. At its simplest level, MFA is multiple levels of authentication in which an individual authenticates not only with a password (something they know), but some type of unique code or device they have. Even if their password is compromised, their account and data are still safe because the cyber attacker does not have access to the second form of authentication. Unfortunately, that is where the simplicity of MFA stops, and things can get a bit complicated.
First, there are many different terms to describe MFA (Multi-Factor Authentication). Some organizations or vendors call it Two-Step Verification, Two-Factor Authentication (2FA), One-Time Password (OTP), or Strong Authentication. All are implying the same thing, authentication requiring two or more forms of authentication—usually a password and something else such as a unique code sent to, or generated by, your mobile device.
In addition, there are multiple ways to implement MFA. While the below list is by no means exhaustive, some of the most common methods are included below.
So, what approach should your organization support? In most cases, this will be decided by your security or risk management team. Regardless of which method you select, any one of them is better than just passwords alone. To effectively implement any form of MFA, your key goals will include:
If you are going to train your organization how to use MFA and the benefits of doing so, one of the best ways to prepare yourself is to start using it yourself. Don’t just set up MFA for your work accounts but also enable it for your personal accounts like your personal Gmail account, Amazon account, or other sites that support it. This way you not only become more familiar with the technology, but you will be exposed to the different methods and approaches for implementing MFA.
Lance revolutionized cyber defense by founding the Honeynet Project. Over the past 25 years, he has helped 350+ organizations worldwide build resilient security cultures, transforming human risk management into a cornerstone of modern cybersecurity.
Read more about Lance Spitzner