By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Cookie Policy for more information.
Icon Rounded Closed - BRIX Templates
Insights

Why Good Enough MFA is Now a Business Liability

5 mins
share on
Why Good Enough MFA is Now a Business Liability

“Good-enough” multi-factor authentication (MFA), like SMS codes, one-time passwords, and push approvals, is now a business liability because attackers can steal or relay those factors in real time. The modern baseline is phishing-resistant MFA, which uses cryptographic, origin-bound credentials (such as passkeys/FIDO2) that won’t authenticate on lookalike sites.

Microsoft explicitly positions phishing-resistant MFA as necessary because traditional MFA methods can be intercepted or socially engineered.

The executive mandate for securing corporate identities has always been straightforward: "Turn on Multi-Factor Authentication (MFA)." The logic was simple. If an employee has to enter a code from a text message or approve a push notification after entering their password, the organization is safe.

That assumption is no longer valid.

Attackers have industrialized methods to bypass traditional MFA. If your defense relies on a human being correctly identifying a malicious URL or spotting a fake login page, your defense will eventually fail. To close this critical gap, the goal is to move toward Phishing-Resistant Authentication.

This shift moves identity security from relying on human judgment to relying on cryptographic certainty. Understanding this distinction is essential for leadership and security professionals.

Microsoft and CISA both warn that not all MFA is equally resistant to today’s attacks, which is why phishing-resistant approaches are treated as the strongest option.

How Do Adversary-in-The-Middle (AiTM) Attacks Bypass Traditional MFA?

In the past, security awareness training focused on obvious tells: typos in URLs, strange sender addresses, and suspicious formatting. Today, adversary-in-the-middle (AiTM) attacks make those checks far less reliable because the attacker can place themselves between the user and the legitimate service during authentication.

Imagine a user receives an email that looks exactly like a standard Microsoft 365 login request. They click the link, and it takes them to a page that looks identical to your company’s login portal. When they type their password and enter their MFA code, the attacker, sitting invisibly in the middle, captures both instantly.

The attacker then uses that code immediately on the real site to log in as the user. By the time the employee realizes something is wrong, the attacker is already inside. This happens in seconds, and no amount of "user awareness training" can fully stop it because the process looks legitimate to the user.

AiTM phishing proxies a real login to capture credentials, MFA, and session cookie

The Solution: The Hierarchy of Authentication

Not all locks are created equal. It is vital to distinguish between standard MFA, passwordless convenience, and true phishing resistance.

1. Standard MFA (The Legacy Baseline)

This is what most organizations use today. It combines a password with a secondary check, like an SMS text code or a simple "Approve" button on a phone.

  • The Risk: As described above, these can be Phished. If a user can be tricked into typing a code into a fake website, the security is broken.

2. Passwordless Authentication (User Experience vs. Security)

"Passwordless" means removing the password from the user's daily sign-in routine.

  • The Benefit: Users love this. They might just type a number from their screen into their phone app.
  • The Nuance: While this improves the user experience and eliminates risks associated with weak passwords, not all passwordless methods are phishing-resistant. A sophisticated attacker can still trick a user into approving a sign-in they didn't initiate.

3. Phishing-Resistant Authentication (The New Standard)

This is the strategic goal. Phishing-resistant methods use FIDO2 standards to create a digital "handshake" between the device and the specific website.

  • How it works: Think of this like a physical key that only fits one specific lock. If a user is lured to a fake website (e.g., c0rporate-login.com instead of corporate-login.com), the authentication device (like a Security Key or Windows Hello) recognizes that the "lock" is different. It will simply refuse to sign in.
  • The Result: It doesn't matter if the user wants to sign in; the technology prevents the mistake.

Is passwordless the same as phishing-resistant?

Passwordless is about removing the password step, while phishing resistance is about removing the ability to authenticate to an impostor. Those often overlap, but they are not identical.

Authentication evolution from legacy to phishing-resistant

The Strategic Pivot: Aligning with NIST

This shift isn't just a Microsoft recommendation; it is the federal standard. The National Institute of Standards and Technology's (NIST) 800‑63 digital identity guidance has evolved significantly in recent revisions.

Crucially, NIST now recommends against arbitrary password expiration policies (e.g., forcing employees to change passwords every 90 days).

  • Old Thinking: "Changing passwords frequently keeps us safe."
  • New Reality: Forcing changes makes people choose weak, predictable passwords (like Summer2025!, then Autumn2025!).

The modern standard is to use strong, long-term authentication methods and only force a reset if there is evidence of a compromise. Moving to phishing-resistant methods allows us to finally abandon these outdated policies, improving employee satisfaction while decreasing risk.

Password security evolution: the old way vs the new way

Investments and Requirements

Moving up this hierarchy requires specific licensing and potentially hardware investments.

1. Licensing Prerequisites To enforce these secure policies effectively, ensure you have the right Microsoft Entra (formerly Azure AD) licenses:

Microsoft Entra ID P1: The baseline required to create "Conditional Access" policies that say, "If you are accessing sensitive Finance data, you must use a phishing-resistant key."

Microsoft Entra ID P2 (Recommended): This adds automation. It allows us to trigger these strict requirements only when the system detects risk (like a login coming from a new country), keeping friction low for normal daily work.

2. Hardware & Organizational Investments

Hardware Budget: Provision FIDO2 security keys (like YubiKeys) for high-value targets. This includes the C-suite, IT Administrators, and anyone in Finance/HR with access to sensitive data.

Policy Review: Security leadership must be empowered to revise corporate password policies to align with NIST guidance, removing scheduled rotations in favor of stronger authentication methods.

The Business Value

Migrating to phishing-resistant authentication delivers immediate, measurable value:

  • Stop the Most Expensive Attacks: It effectively neutralizes the primary entry point for ransomware (credential theft).
  • Lower Support Costs: By leaning on Windows Hello (face/fingerprint ID) or hardware keys, password reset tickets can drop significantly.
  • Faster Workflows: Biometric logins are significantly faster than typing complex passwords and fumbling for SMS codes, reducing friction in every employee's morning routine.

The transition from standard MFA to phishing-resistant authentication is no longer an "optional upgrade." It is the necessary baseline for protecting our modern environment.

Turning on MFA was once a major step forward, but “good enough” MFA is now a liability because attackers can phish, relay, or fatigue users into completing traditional second-factor challenges.

Phishing-resistant MFA raises the bar by relying on cryptographic, origin-bound credentials that are designed not to work on impostor sites. Microsoft and CISA both point toward phishing-resistant MFA as the direction organizations should prioritize for meaningful identity hardening.

Close your MFA bypass gap today. Talk to a Security Expert.
Case Study Details

Similar posts

Get our perspectives on the latest developments in technology and business.
Love the way you work. Together.
Next steps
Have a question, or just say hi. 🖐 Let's talk about your next big project.
Contact us
Mailing list
Occasionally we like to send clients and friends curated articles that have helped us improve.
Close Modal