Essential Eight Series: Multi-Factor Authentication - Beyond Passwords
Back to Blog
essential-eightmfaauthenticationcybersecuritycomplianceaustralian-businesses

Essential Eight Series: Multi-Factor Authentication - Beyond Passwords

Claudio W.27 January 20265 min read

Part 7 of our comprehensive Essential Eight cybersecurity series for Australian businesses.

The Password Problem

Passwords alone are no longer sufficient to protect your organization. With billions of stolen credentials available on the dark web, sophisticated phishing attacks, and automated password-guessing tools, relying solely on passwords is an invitation for compromise.

Multi-Factor Authentication (MFA) addresses this fundamental weakness.

What is Multi-Factor Authentication?

MFA requires users to provide two or more verification factors to access a resource:

  1. 1.Something you know – Password, PIN
  2. 2.Something you have – Phone, security key, smart card
  3. 3.Something you are – Fingerprint, face recognition

By requiring multiple factors, MFA ensures that a stolen password alone isn't enough for an attacker to gain access.

Why MFA is Essential

The Statistics

  • 99.9% of account compromise attacks can be blocked by MFA (Microsoft)
  • 80% of breaches involve compromised credentials
  • Phishing attacks increased by 61% in 2023

Common Attack Vectors Mitigated

  • Credential stuffing: Automated testing of stolen username/password pairs
  • Phishing: Tricking users into revealing passwords
  • Brute force: Automated password guessing
  • Password spraying: Testing common passwords across many accounts
  • Keylogging: Malware capturing typed passwords

Maturity Levels for MFA

Maturity Level One

  • MFA for remote access (VPN, RDP, cloud services)
  • MFA for privileged users (administrators)
  • MFA for third-party access

Maturity Level Two

  • MFA for all users accessing internet-facing services
  • MFA for all privileged access including on-premises
  • Phishing-resistant MFA methods for privileged accounts

Maturity Level Three

  • MFA for all users, all services
  • Phishing-resistant MFA only (FIDO2, smart cards)
  • Continuous authentication and risk-based access policies

MFA Methods Compared

MethodSecurityUsabilityPhishing Resistant
SMS codesLowHighNo
Email codesLowHighNo
Authenticator apps (TOTP)MediumMediumNo
Push notificationsMediumHighPartially
Hardware security keys (FIDO2)HighMediumYes
Smart cardsHighLowYes
Biometrics + deviceHighHighPartially

Phishing-Resistant MFA

The ACSC increasingly recommends phishing-resistant MFA, especially for privileged access:

  • FIDO2 Security Keys: YubiKey, Google Titan, Feitian
  • Windows Hello for Business: Platform authenticator
  • Passkeys: Emerging standard for passwordless authentication
  • Smart Cards: Traditional PKI-based authentication

Implementation Strategy

Step 1: Prioritize High-Value Targets

Start with accounts that would cause the most damage if compromised:

  1. 1.Global administrators and IT staff
  2. 2.Finance and HR personnel
  3. 3.Executives and board members
  4. 4.Remote access users
  5. 5.All remaining users

Step 2: Choose Appropriate Methods

Select MFA methods based on:

  • User population: Technical comfort level
  • Access patterns: Mobile, remote, on-premises
  • Risk level: Standard users vs privileged access
  • Integration requirements: Existing systems and vendors

Step 3: User Communication and Training

MFA changes the user experience. Prepare users:

  • Explain why MFA is being implemented
  • Provide clear enrollment instructions
  • Offer multiple enrollment sessions
  • Establish support channels for issues

Step 4: Rollout Approach

  • Pilot group: Start with IT and early adopters
  • Phased rollout: Expand by department or location
  • Enforcement: Move from optional to required
  • Monitoring: Track enrollment and login issues

Step 5: Emergency Access Procedures

Plan for MFA failures:

  • Recovery codes: Securely stored backup codes
  • Alternate contact methods: Secondary phone/email for account recovery
  • Admin override procedures: For genuine lockouts
  • Break-glass accounts: Emergency access with enhanced monitoring

Common Challenges

User Resistance

Some users resist change. Address this with:

  • Executive mandate and communication
  • Clear explanation of the security benefits
  • Streamlined enrollment processes
  • Choice of MFA methods where possible

Legacy Applications

Not all applications support modern MFA. Options include:

  • Identity federation via SAML/OIDC
  • Reverse proxy with pre-authentication
  • Application upgrade or replacement
  • Compensating controls for exceptions

Lost Devices

Users will lose phones or security keys. Prepare with:

  • Self-service recovery options
  • Fast replacement processes
  • Temporary bypass procedures with logging

Beyond MFA: Conditional Access

Modern identity systems support context-aware access decisions:

  • Location-based: Block or require stronger auth from unusual locations
  • Device-based: Require compliant/managed devices
  • Risk-based: Increase requirements when risk signals detected
  • Time-based: Restrict access outside business hours

Next Steps

With strong authentication in place, you need to ensure you can recover from incidents. Our final Essential Eight article covers Regular Backups—your last line of defense against ransomware.

Ready to implement MFA? Cloudscape IT specializes in identity and access management for Australian businesses. Contact us for an MFA assessment and implementation roadmap.

---

This article is part of our Essential Eight cybersecurity series.

Share this article