{"id":21923,"date":"2023-05-04T05:01:04","date_gmt":"2023-05-04T13:01:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/05\/04\/news-15654\/"},"modified":"2023-05-04T05:01:04","modified_gmt":"2023-05-04T13:01:04","slug":"news-15654","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/05\/04\/news-15654\/","title":{"rendered":"How Microsoft can help you go passwordless this World Password Day"},"content":{"rendered":"<p><strong>Credit to Author: Christine Barrett| Date: Thu, 04 May 2023 13:00:00 +0000<\/strong><\/p>\n<p>It\u2019s that time of year again. World Password Day is May 4, 2023.<sup>1<\/sup> There\u2019s a reason it\u2019s still going strong 10 years after being created by cybersecurity professionals. A recent study that analyzed more than 15 billion passwords found that the top 10 most popular passwords still include easy-to-crack combinations like \u201c123456\u201d and \u201cqwerty.\u201d<sup>2<\/sup> With that level of security, many organizations are essentially leaving the front door open. Sharing your password for a streaming service may seem harmless (their accountants might disagree), but this behavior sometimes bleeds into the workplace, where weak or shared employee passwords often become one of the largest security threat vectors that companies face.<\/p>\n<p>In 2022, Microsoft tracked <strong>1,287<\/strong> <strong>password attacks every second<\/strong><sup> <\/sup>(more than 111 million per day).<sup>3<\/sup> Phishing is an increasingly favored attack method, up 61 percent from 2021 to 2022.<sup>4<\/sup> And our data for 2023 shows that this trend is continuing. Passwords should play no part in a future-looking credential strategy. That\u2019s why you don\u2019t need a password for Microsoft Accounts\u2014hundreds of thousands of people have deleted their passwords completely.<sup>5<\/sup><\/p>\n<p>For stronger, streamlined security, <a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\/passwordless-authentication\">Microsoft passwordless authentication<\/a> can help your organization eliminate password vulnerabilities while providing simplified access across your entire enterprise. In honor of World Password Day, this blog will help you make the case to your organization that when it\u2019s time to \u201cverify explicitly\u201d as part of a Zero Trust strategy, modern strong authentication using phishing-resistant passwordless credentials provide the best security and an excellent return on investment (ROI).<\/p>\n<h2 class=\"wp-block-heading\">Go passwordless for simplicity, security, and savings<\/h2>\n<p>If you\u2019ve read my blog on why <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-entra-azure-ad-blog\/your-pa-word-doesn-t-matter\/ba-p\/731984\" target=\"_blank\" rel=\"noreferrer noopener\">no passwords are good passwords<\/a>, you know my feelings on this subject. To quote myself: \u201cYour password isn\u2019t terrible. It\u2019s <em>definitely<\/em> terrible, given the likelihood that it gets guessed, intercepted, phished, or reused.\u201d As Microsoft Chief Information Security Officer Bret Arsenault likes to say, \u201cHackers don\u2019t break in\u2014they log in.\u201d<\/p>\n<p>Passwords alone are simply not sufficient protection. Old-fashioned multifactor authentication bolts a second factor onto a password to add a layer of protection, but the most popular of these\u2014telephony\u2014is also the most problematic (see my blog about <a href=\"https:\/\/aka.ms\/hangup\" target=\"_blank\" rel=\"noreferrer noopener\">hanging up on phone transports<\/a> to understand why telephony is a poor option for multifactor authentication). Even with strong methods, like using <a href=\"https:\/\/www.microsoft.com\/security\/mobile-authenticator-app\">Microsoft Authenticator<\/a> to augment a password, you still have the vulnerability of the password itself. The best password is no password\u2014and you can get there today with <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-it-pro-blog\/windows-hello-fido2-certification-gets-you-closer-to\/ba-p\/534592\" target=\"_blank\" rel=\"noreferrer noopener\">Windows Hello<\/a>, security keys, or, my favorite, Microsoft Authenticator.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"416\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/MicrosoftTeams-image-6-1024x416.jpg\" alt=\"Graphic showing a range of identity protection methods, going from bad to best. The first column on the left shows bad passwords; the second column shows good password; the third column shows better passwords; and the fourth column shows best passwords. \" class=\"wp-image-127654\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/MicrosoftTeams-image-6-1024x416.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/MicrosoftTeams-image-6-300x122.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/MicrosoftTeams-image-6-768x312.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/MicrosoftTeams-image-6.jpg 1229w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<p><em>Figure 1. Identity protection methods are not made equal; certain protections are far more secure than others.<\/em><\/p>\n<p>In 2022, Microsoft committed to the next step of making passwords a thing of the past by joining with the FIDO Alliance and other major platforms in supporting passkeys as a <a href=\"https:\/\/fidoalliance.org\/apple-google-and-microsoft-commit-to-expanded-support-for-fido-standard-to-accelerate-availability-of-passwordless-sign-ins\/\" target=\"_blank\" rel=\"noreferrer noopener\">common passwordless sign-in method<\/a>. Passkeys aim to not only replace passwords with something more cryptographically sound, but that\u2019s also as easy and intuitive to use as a password. Passwordless technology, such as Windows Hello, that\u2019s based on the Fast Identity Online (FIDO) standards, strengthens security by doing the verification on the device, rather than passing user credentials through an (often vulnerable) online connection. It also provides a simplified user experience, which can help boost productivity as well.<\/p>\n<p>That was the goal when longtime Microsoft collaborator Accenture decided to simplify their user experience by removing the requirement for password authentication. With 738,000 employees spread across 49 countries, the company decided it was in its best interest to make their identity and access management (IAM) automated and easy. Accenture chose the Microsoft Authenticator app, <a href=\"https:\/\/learn.microsoft.com\/windows\/security\/identity-protection\/hello-for-business\/hello-how-it-works\" target=\"_blank\" rel=\"noreferrer noopener\">Windows Hello for Business<\/a>, and <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/authentication\/concept-authentication-passwordless#fido2-security-keys\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO2 security keys<\/a> as its passwordless authentication solutions. As described in their case study, the results are already being felt: \u201cThe adoption of passwordless has led to faster login times, more reliable experience, fewer failed authentications, and improved overall security posture.\u201d<sup>6<\/sup><\/p>\n<p>Whether you\u2019re part of a global organization like Accenture or a small startup, the authentication methods policy in <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/azure-active-directory\">Microsoft Azure Active Directory<\/a> (Azure AD)\u2014now part of <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-entra\">Microsoft Entra<\/a>\u2014allows your IAM team to easily manage passwordless authentication for all users from a single pane of glass. Even better, a recent Forrester Consulting study found that a composite organization based on interviewed customers securing its business apps with Azure AD benefited from a three-year <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/20\/microsoft-entra-delivers-240-percent-roi-according-to-new-forrester-study\/\">240 percent ROI<\/a> (a net present value of USD8.5 million over three years) while reducing the number of password reset requests to its help desk by a significant 75 percent annually.<sup>7<\/sup><\/p>\n<h2 class=\"wp-block-heading\">Multifactor authentication can\u2019t do it all<\/h2>\n<p>A 2021 report by the Ponemon Institute found that phishing attacks were costing large United States-based companies an average of USD14.8 million annually.<sup>8<\/sup> That\u2019s way up from 2015\u2019s figure of USD3.8 million. Microsoft alone <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-digital-defense-report-2022\">blocked 70 billion email and identity attacks<\/a> in 2022. But on the positive side, multifactor authentication has been shown to reduce the risk of compromise by 99.9 percent for identity attacks.<sup>9<\/sup> That\u2019s a pretty stellar statistic, but it\u2019s not bulletproof; especially when considering that SMS is 40 percent less effective than stronger authentication methods.<sup>10<\/sup> Attackers are always learning and improvising, as shown in the rise of <strong>multifactor authentication fatigue attacks<\/strong>. In this type of cyberattack:<\/p>\n<ol type=\"1\">\n<li>The threat actor uses compromised credentials (often obtained through a phishing attack) to initiate an access attempt to a user\u2019s account.<\/li>\n<li>The attempt triggers a multifactor authentication push notification to the user\u2019s device, such as \u201cDid you just try to sign in? Yes or no.\u201d<\/li>\n<li>If the targeted person doesn\u2019t accept, the attacker keeps at it\u2014flooding the target with repeated prompts.<\/li>\n<li>The victim becomes so overwhelmed or distracted, they finally click \u201cyes.\u201d Sometimes the attacker will also use social engineering, contacting the target through email, messaging, or phone pretending to be a member of the IT team.<\/li>\n<\/ol>\n<p>One widely publicized multifactor authentication fatigue attack happened in September 2022, when an 18-year-old hacker used the compromised credentials of a contractor to gain access to a major rideshare company\u2019s internal networks. Once inside, he was able to access tokens for the company\u2019s cloud infrastructure and critical IAM service. Our research was ahead of this type of attack back in 2021 when we built multifactor authentication defenses into the Authenticator app, including <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/authentication\/how-to-mfa-number-match\" target=\"_blank\" rel=\"noreferrer noopener\">number matching<\/a> and <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/authentication\/how-to-mfa-additional-context\">additional context<\/a>. To learn more, be sure to read my blog post: <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-entra-azure-ad-blog\/defend-your-users-from-mfa-fatigue-attacks\/ba-p\/2365677\" target=\"_blank\" rel=\"noreferrer noopener\">Defend your users from multifactor authentication fatigue attacks<\/a>.<\/p>\n<h2 class=\"wp-block-heading\">All identity protection rests on Zero Trust<\/h2>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\">Zero Trust<\/a> is just another way of describing proactive security. Meaning, it\u2019s the measures you should take before bad things happen, and it\u2019s based on one simple principle: \u201cNever trust; always verify.\u201d In today\u2019s decentralized, bring-your-own-device (BYOD), hybrid and remote workplace, Zero Trust provides a strong foundation for security based on <strong>three pillars:<\/strong><\/p>\n<ul>\n<li><strong>Verify explicitly:<\/strong> Authenticate every user based on all available data points\u2014identity, location, device health, service or workload, data classification, and anomalies.<\/li>\n<li><strong>Use least-privilege access: <\/strong>This means limiting access according to the user\u2019s specific role and task. You should also apply risk-based policies and <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2023\/02\/06\/introducing-adaptive-protection-in-microsoft-purview-people-centric-data-protection-for-a-multiplatform-world\/\">adaptive protection<\/a> to help secure your data without hindering productivity.<\/li>\n<li><strong>Assume breach:<\/strong> This allows your security team to minimize the blast radius and prevent lateral movement if a breach occurs. Maintaining end-to-end encryption and using analytics will also strengthen threat detection and improve your defenses.<\/li>\n<\/ul>\n<p>And when it comes to \u201cverify explicitly\u201d as part of Zero Trust, no investment in the field of credentials is better than a passwordless journey; it literally moves the goalposts on the attackers.<\/p>\n<p>May the Fourth be with you all!<\/p>\n<h2 class=\"wp-block-heading\">Security year round<\/h2>\n<p>At Microsoft Security, we believe security is about people. Empowering users with strong, streamlined access from anywhere, anytime, on any device is part of that mission. Learn more about <a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\/passwordless-authentication\">Microsoft passwordless authentication<\/a> and how it can help your organization eliminate vulnerabilities while providing fast, safe access across your entire enterprise.<\/p>\n<p>To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and Twitter (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<div style=\"height:47px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/nationaldaycalendar.com\/world-password-day-first-thursday-in-may\/\" target=\"_blank\" rel=\"noreferrer noopener\">World Password Day<\/a>, National Day Calendar.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/cybernews.com\/best-password-managers\/most-common-passwords\/\" target=\"_blank\" rel=\"noreferrer noopener\">Most common passwords: latest 2023 statistics<\/a>, Paulius Masiliauskas. April 20, 2023.<\/p>\n<p><sup>3<\/sup><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2023\/01\/09\/microsoft-entra-5-identity-priorities-for-2023\/\">Microsoft Entra: 5 identity priorities for 2023<\/a>, Joy Chik. January 9, 2023.<\/p>\n<p><sup>4<\/sup><a href=\"https:\/\/www.securitymagazine.com\/articles\/98536-over-255m-phishing-attacks-in-2022-so-far\" target=\"_blank\" rel=\"noreferrer noopener\">Over 255m phishing attacks in 2022 so far<\/a>, Security Magazine. October 26, 2022.<\/p>\n<p><sup>5<\/sup><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/15\/the-passwordless-future-is-here-for-your-microsoft-account\/\">The passwordless future is here for your Microsoft account<\/a>, Vasu Jakkal. September 15, 2021.<\/p>\n<p><sup>6<\/sup><a href=\"https:\/\/www.accenture.com\/us-en\/case-studies\/about\/passwordless-journey?culture=en-us&amp;country=us\" target=\"_blank\" rel=\"noreferrer noopener\">A passwordless enterprise journey<\/a>, Accenture.<\/p>\n<p><sup>7<\/sup>The Total Economic Impact<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/14.0.0\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> of Microsoft Entra, a commissioned study conducted by Forrester Consulting. March 2023.<\/p>\n<p><sup>8<\/sup><a href=\"https:\/\/www.globenewswire.com\/en\/news-release\/2021\/08\/17\/2281950\/35374\/en\/New-Ponemon-Institute-Study-Reveals-Average-Phishing-Costs-Soar-to-14-8M-Annually-Nearly-Quadrupling-Since-2015.html\" target=\"_blank\" rel=\"noreferrer noopener\">New Ponemon Institute Study Reveals Average Phishing Costs Soar to $14.8M Annually, Nearly Quadrupling Since 2015<\/a>, GlobeNewswire. August 17, 2021.<\/p>\n<p><sup>9<\/sup><a href=\"https:\/\/www.zippia.com\/advice\/mfa-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">17 Essential multi-factor authentication (mfa) statistics [2023]<\/a>, Jack Flynn.&nbsp;February 6, 2023.<\/p>\n<p><sup>10<\/sup><a href=\"https:\/\/arxiv.org\/abs\/2305.00945\" target=\"_blank\" rel=\"noreferrer noopener\">How effective is multifactor authentication at deterring cyberattacks?<\/a> Lucas Meyer, et al. May 1, 2023. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/05\/04\/how-microsoft-can-help-you-go-passwordless-this-world-password-day\/\">How Microsoft can help you go passwordless this World Password Day<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/05\/04\/how-microsoft-can-help-you-go-passwordless-this-world-password-day\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christine Barrett| Date: Thu, 04 May 2023 13:00:00 +0000<\/strong><\/p>\n<p>Learn how guessing, replay, phishing, and multifactor authentication fatigue attacks demonstrate the ongoing vulnerability of passwords, and why going passwordless makes your organization more secure while improving user experience.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/05\/04\/how-microsoft-can-help-you-go-passwordless-this-world-password-day\/\">How Microsoft can help you go passwordless this World Password Day<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500,21872,25300],"class_list":["post-21923","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity","tag-identity-and-access-management","tag-identity-and-access-management-series"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21923"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21923\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21923"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}