2

When to Use Different Types of MFA

There is no magic bullet to solve all security needs. Hackers will actively look at ways to break it even if one existed, just as security companies create more and more solutions to improve the chances of better defending against threats. This chapter discusses when and when not to use different forms of multifactor authentication (MFA). We will also look at some websites for up-to-date information about MFA and new threats.

We are going to cover the following topics:

  • Not all MFA is created equal – when to use different types of MFA
  • Keeping up with bad actors – good sources for up-to-date information on MFA and related topics

Not all MFA is created equal – when to use different types of MFA

In May 2021, ...

Get Implementing Multifactor Authentication now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.