MFA and Social Engineering
Podcast: Play in new window | Download
Subscribe: RSS
A lot is made of adding MFA/2FA to everything you log in to. And you absolutely should do this.
What isn’t discussed enough are ways to circumvent MFA. Most of the methods for bypassing 2FA/MFA are social engineering tactics. What’s even scarier is the methods used to bypass MFA are not that complicated.
How are end-users being tricked into bypassing MFA and what can you do to protect yourself from potentially handing your account over to an attacker?
Leave a Reply
Want to join the discussion?Feel free to contribute!