Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Why Identity Security Must Move Beyond MFA

By integrating identity threat detection with MFA, organizations can protect sensitive data, maintain operational continuity, and reduce risk exposure.

Identity Security

Multi-factor authentication (MFA) has become a cornerstone of modern cybersecurity. According to Okta’s Secure Sign-In Trends Report 2025 around 70 percent of users in enterprise environments are using MFA as of early 2025. Using multiple authentication factors adds an extra layer of defense that greatly limits unauthorized entry into sensitive systems. However, it is not a complete solution. Cybercriminals continue to target the human element, finding ways to bypass authentication controls through AI-supercharged phishing, impersonation, SIM swapping, social engineering, and credential theft.

MFA requires users to provide two or more types of evidence to prove their identity. These factors fall into three categories: something you know (e.g., password, PIN), something you have (e.g., security token, smartphone app, smart card), and something you are (e.g., biometrics like fingerprint or face scan).

According to studies by both Microsoft and Google, MFA is highly effective when it comes to automated bot attacks and bulk phishing attacks. Thus, it dramatically improves security and is one of the most effective deterrents against account compromise. For example, the Federal Bureau of Investigations (FBI) emphasizes MFA as crucial for security, mandating it for access to Criminal Justice Information (CJI) by all law enforcement agencies. At the same time, they’re warning the public about threats, including criminals bypassing MFA through social engineering, phishing, keylogging, spoofing, and stealing “remember-me” cookies to gain unauthorized access to accounts and data.

Not All Authenticators Are Equally Vulnerable

Another important thing to remember is that not all MFA is equal. This is illustrated by most recent stories around MFA bypass attacks and how cyber collectives like Scattered Spider have found ways around it. In turn, both FBI and the National Institute of Standards and Technology (NIST), discouraged organizations to continue usage of email-based one-time passwords (OTP) and SMS codes, as they’re extremely vulnerable to compromised email accounts and SIM swapping interceptions.

In turn, more organizations are shifting to adopt “phishing-resistant” authentication, which according to the Secure Sign-In Trends Report 2025 has grown by 63%, rising from 8.6% to 14.0% in one year. These phishing-resistant methods are comprised of using hardware-based security keys (e.g., FIDO2, YubiKey, smart card), authenticator apps (TOTP, Google or Microsoft Authenticator), or public key cryptography like FastPass or WebAuthn.

Advertisement. Scroll to continue reading.

Beware of the Human Element

Despite these phishing-resistant methods, the human factor remains one of the most vulnerable points in any security strategy. Employees, contractors, and partners may unintentionally expose sensitive information or use weak passwords. Even the most sophisticated MFA systems cannot prevent risks that arise from poor user habits or compromised credentials. This reality highlights the need for strong security practices alongside MFA.

Go Beyond MFA with Identity Threat Detection

In this context, security cautious organizations have turned their attention to emerging identity threat detection and risk mitigation solutions that continuously monitor user behavior across networks, applications, and devices. They identify anomalies such as unusual login locations, unexpected device changes, or access patterns inconsistent with a user’s normal activity. By flagging these suspicious behaviors in real time, organizations can intervene before a breach occurs. For example, if an employee account logs in simultaneously from two continents, the system can trigger additional verification or temporarily suspend access until the activity is validated.

A layered security approach is critical. MFA should remain a foundational control, but it must be supplemented with real-time monitoring, risk-based authentication, and adaptive policies. Identity threat detection also provides valuable visibility into potential risks. Security teams gain insights into abnormal activity trends and can enforce policies dynamically. This capability not only reduces the likelihood of successful attacks but also improves compliance with data protection regulations. Over time, these systems can learn normal user behavior patterns, making threat detection more accurate and reducing false positives.

The stakes are high. Compromised credentials are one of the leading causes of security incidents today, and cybercriminals are increasingly sophisticated. By integrating identity threat detection with MFA, organizations can protect sensitive data, maintain operational continuity, and reduce risk exposure. At the same time, employees are empowered to play an active role in maintaining security, transforming the human element from a vulnerability into a line of defense.

Conclusion

Securing the human element is no longer optional. Organizations that embrace a comprehensive identity security strategy are better positioned to defend against evolving threats, safeguard their digital assets, and build trust with customers and partners. Identity threat detection and risk mitigation is not just an add-on to authentication. It is a necessary evolution in how companies approach cybersecurity in a world where human behavior can make or break security efforts.

Related: Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking

Related: Prioritizing Identity to Safeguard Critical Infrastructure

Written By

Dr. Torsten George is an internationally recognized IT security expert, author, and speaker with more than 30 years of experience in the global IT security community. He regularly provides commentary and publishes articles on data breaches, insider threats, compliance frameworks, and IT security best practices. He is also the co-author of the Zero Trust Privilege for Dummies book. Torsten is currently serving as Chief Marketing Officer at ID Dataweb. Prior he held executive level positions with ConnectWise, Absolute Software, Centrify, RiskSense, RiskVision, ActivIdentity, Digital Link, and Everdream Corporation.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Anti-ransomware platform Halcyon has named Kirstjen Nielsen and Chris Inglis as Strategic Advisors.

ThreatModeler has appointed Kevin Gallagher as Chief Executive Officer.

Thomas Bain has been appointed Chief Marketing Officer at Silent Push.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.