{"id":50967,"date":"2021-09-01T08:00:49","date_gmt":"2021-09-01T07:00:49","guid":{"rendered":""},"modified":"2021-09-07T14:16:13","modified_gmt":"2021-09-07T13:16:13","slug":"how-multi-factor-authentication-empowers-secure-hybrid-working","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/","title":{"rendered":"How multi-factor authentication empowers secure hybrid working"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-large webp-format alignright\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_021-1024x683.webp\" alt=\"Side view close-up of a man typing on his phone while standing behind a Microsoft Surface Studio.\" width=\"480\" height=\"320\" data-orig-srcset=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_021-1024x683.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_021-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_021-768x512.jpg 768w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_021-1536x1025.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_021-2048x1366.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_021-330x220.jpg 330w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_021-800x534.jpg 800w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_021-400x267.jpg 400w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_021-1024x683.jpg\" \/>As we increasingly work outside the office and across different devices, organisations are looking at cloud modernisation and resilient security strategies. To adapt to a complex modern environment, organisations need a strategy that embraces the mobile workforce and empowers productivity, all while protecting people, devices and data no matter where they\u2019re located. Enabling identity-based security is key to adapting to the hybrid workplace. And multi-factor authentication (MFA) is one of the baseline components of any identity infrastructure.<\/p>\n<p>Multi-factor authentication adds another layer of protection to the sign-in process. After all, if you only use a password to authenticate users, it leaves an insecure vector for attack. What if the password was weak? Or if it was exposed elsewhere? Are you sure that person signing in is really the user? When you require a second form of authentication that isn\u2019t easy to obtain, you are building another layer of security.<\/p>\n<p>Therefore, ensuring you use the right type of MFA service is of critical importance. Different MFA solutions can have a dramatic impact on cost, user experience and your resilience to service outages and attacks. In this post we&#8217;re going to look at some of these factors and make some recommendations to ensure your MFA solution enables your organisation, and your people, to be productive safely.<\/p>\n<h2>1.\u00a0\u00a0\u00a0\u00a0\u00a0 Optimise security processes to bring down costs<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-medium size-medium webp-format alignright\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_042-300x200.webp\" alt=\"Man in a collared shirt working on a server station inside a secure room. Coworkers and large monitors are in the background.\" width=\"300\" height=\"200\" data-orig-srcset=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_042-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_042-1024x683.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_042-768x512.jpg 768w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_042-1536x1025.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_042-2048x1366.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_042-330x220.jpg 330w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_042-800x534.jpg 800w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_042-400x267.jpg 400w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/SEC20_Security_042-300x200.jpg\" \/>A vulnerable entry point for cyber attackers is to use credential-based attacks to access networks and steal data or spread ransomware. However, multi-factor authentication stops 99.9 percent of credential-based attacks. That\u2019s why MFA really is one of the most fundamental security measures. At Microsoft, we deploy MFA to protect our customers, our data, systems, and our business. Azure AD MFA is used across our consumer platforms like Outlook.com and Xbox, as well as thousands of other online services. In fact, its foundational to our <a href=\"https:\/\/aka.ms\/securitysteps\" target=\"_blank\" rel=\"noopener\">five steps to secure your identity infrastructure<\/a>.<\/p>\n<p>Online retailer <a href=\"https:\/\/customers.microsoft.com\/en-gb\/story\/838425-asos-retailer-azure-active-directory-m365\" target=\"_blank\" rel=\"noopener\">Asos<\/a> uses Azure AD (including MFA) to protect identity as the new perimeter. By automating, provisioning and deprovisioning user accounts across its SaaS landscape, they have reduced costs and errors, all while improving productivity.<\/p>\n<p>\u201cOur service desk spends much less time setting up users and creating or deleting accounts, which gets our costs down,\u201d says Mark Lewis, Infrastructure Architect at ASOS. \u201cWe made our lives easier by adopting Azure Active Directory\u2014we\u2019ve saved time and money, improved the employee experience, and enhanced the security of our entire SaaS ecosystem.\u201d<\/p>\n<p>Where cost may be a blocking factor, in Azure AD the options to use SMS and phone-based MFA are free. In the case where certain users might be specifically targeted, you can selectively upgrade people to <a href=\"https:\/\/azure.microsoft.com\/en-gb\/pricing\/details\/active-directory\/\" target=\"_blank\" rel=\"noopener\">P1 or P2 licensing models<\/a> and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/how-to-nudge-authenticator-app\" target=\"_blank\" rel=\"noopener\">nudge people towards<\/a> using the Microsoft Authenticator app with a one-time-password or notification-based MFA.<\/p>\n<p>These days, it\u2019s easy to enable MFA for all with one click. However, you don\u2019t have to take a single, big-bang approach. You can <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/howto-mfa-getstarted#deployment-considerations\" target=\"_blank\" rel=\"noopener\">onboard users into MFA in batches<\/a> that are digestible by your service desk. Typically, 10 percent of any given batch will need support, so the ability to onboard in batches has a dramatic impact on the cost of deploying MFA. For employees, using multi-factor authentication when paired with single sign-on can increase productivity as they can access everything they need without re-entering passwords.<\/p>\n<p>And if there is still resistance, this is one of those measures which business leaders should by now expect. We\u2019ve seen the reports of the cost and reputational damages that security breaches can have on organisations. Leaders should be challenging IT to ensure the safety of their customers, employees, systems and data. And MFA is one of the critical elements to delivering that.<\/p>\n<h2>2.\u00a0\u00a0\u00a0\u00a0\u00a0 Balance security and productivity with multi-factor authentication<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-medium size-medium webp-format alignright\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MSC21_remoteWorkplace_Surface_003-1-300x200.webp\" alt=\"A woman working from home on a Teams call\" width=\"300\" height=\"200\" data-orig-srcset=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MSC21_remoteWorkplace_Surface_003-1-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MSC21_remoteWorkplace_Surface_003-1-1024x683.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MSC21_remoteWorkplace_Surface_003-1-768x512.jpg 768w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MSC21_remoteWorkplace_Surface_003-1-1536x1024.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MSC21_remoteWorkplace_Surface_003-1-2048x1365.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MSC21_remoteWorkplace_Surface_003-1-330x220.jpg 330w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MSC21_remoteWorkplace_Surface_003-1-800x533.jpg 800w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MSC21_remoteWorkplace_Surface_003-1-400x267.jpg 400w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MSC21_remoteWorkplace_Surface_003-1-300x200.jpg\" \/>Pre-cloud, security was ring-fenced around the data centre and the physical office, with the network perimeter as the main defence. Often, these featured early methods of MFA &#8211; such as one-time passcode fobs or smart cards. However, on-premise environments can be open to attack through misconfigured web and VPN services, lack of patching, as well as credential hygiene issues.<\/p>\n<p>As organisations move to hybrid cloud-based environments, they can take advantage of existing <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener\">Zero Trust capabilities<\/a> with the knowledge that we will be investing a further <a href=\"https:\/\/twitter.com\/satyanadella\/status\/1430646543376289793?s=20\" target=\"_blank\" rel=\"noopener\">$20 billion<\/a> in our security solutions over the next five years to help defend against ransomware and other threats. With MFA in Azure AD you are consolidating your identity services into a strong and highly trusted environment. You\u2019re not only increasing your resilience to ransomware and supply chain attacks, but also other outages that can occur on-premises.<\/p>\n<p>For <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/842464-durham-university-higher-education-azure-active-directory\" target=\"_blank\" rel=\"noopener\">Durham University<\/a>, they used MFA and Azure AD to ensure their staff and students could keep learning remotely. They use single sign-on to access everything they need whilst keeping their intellectual property secure. \u201cBy migrating to Azure AD, we&#8217;ve moved the responsibility of high availability to Microsoft, who, let\u2019s face it, are scaled to do a better job than we could. Our services are much more resilient.\u201d Says Craig Churchward, Technical Specialist for Windows Platform.<\/p>\n<p>You can also maximise your ability to take advantage of new features as they are delivered, without any concerns for integration and support across vendors. Additionally, older platforms often involve backend server infrastructure, physical tokens and the man-hours needed to issue, replace and troubleshoot those tokens. With Azure AD MFA, users no longer need physical tokens. Additionally, there\u2019s no server infrastructure to maintain. Your IT and security teams can focus on high-value tasks.<\/p>\n<h2>3.\u00a0 \u00a0 \u00a0 Multi-factor authentication empowers secure hybrid working<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-medium size-medium webp-format alignright\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/05\/SUR21_SurfaceLaptop4_Contextual_Platinum_27_RGB-300x207.webp\" alt=\"An employee experience empowers workers. A man works from home on a Teams call.\" width=\"300\" height=\"207\" data-orig-srcset=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/05\/SUR21_SurfaceLaptop4_Contextual_Platinum_27_RGB-300x207.jpg 300w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/05\/SUR21_SurfaceLaptop4_Contextual_Platinum_27_RGB-1024x706.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/05\/SUR21_SurfaceLaptop4_Contextual_Platinum_27_RGB-768x529.jpg 768w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/05\/SUR21_SurfaceLaptop4_Contextual_Platinum_27_RGB-1536x1059.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/05\/SUR21_SurfaceLaptop4_Contextual_Platinum_27_RGB-2048x1412.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/05\/SUR21_SurfaceLaptop4_Contextual_Platinum_27_RGB-330x227.jpg 330w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/05\/SUR21_SurfaceLaptop4_Contextual_Platinum_27_RGB-800x551.jpg 800w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/05\/SUR21_SurfaceLaptop4_Contextual_Platinum_27_RGB-400x276.jpg 400w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/05\/SUR21_SurfaceLaptop4_Contextual_Platinum_27_RGB-300x207.jpg\" \/>A core tenant of Zero Trust is to <strong>never trust \u2013 always verify<\/strong>. Regardless of where the request originates or what resource it accesses, it is always fully authenticated, authorised, and encrypted before granting access. This helps build secure hybrid working. It makes it easier for employees to connect from anywhere, on different devices while protecting organisational data.<\/p>\n<p>MFA and Conditional Access are key to <a href=\"https:\/\/customers.microsoft.com\/en-gb\/story\/787879-rabobank-security-case-study-banking-m365\" target=\"_blank\" rel=\"noopener\">Rabobank\u2019s<\/a> mobility strategy.\u00a0\u201cWe require multi-factor authentication for mobile access today and have Conditional Access policies set up to require new device enrollments to happen on the corporate network. Most importantly, people can enroll and get access quickly\u2014which is good, because we didn\u2019t want to create this digital workplace and slow people down with security,\u201d says Abe Boersma, Global Head of Workplace Services.<\/p>\n<p>Identity is now recognised as one of the core services we use to secure the enterprise. Your identity stack, including your MFA service, is a key component of Microsoft\u2019s security control plane. You can discover more in the guidance found in the <a href=\"https:\/\/docs.microsoft.com\/en-gb\/security\/cybersecurity-reference-architecture\/mcra\/\" target=\"_blank\" rel=\"noopener\">Microsoft Cybersecurity Reference Architectures<\/a> (MCRA) and <a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/compass\/privileged-access-access-model\/\" target=\"_blank\" rel=\"noopener\">Enterprise Admin Model<\/a>.<\/p>\n<h2>4.\u00a0\u00a0\u00a0\u00a0\u00a0 Build a strong security culture<\/h2>\n<p>A <a href=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/03\/24\/3-ways-to-reduce-insider-risk\/\" target=\"_blank\" rel=\"noopener\">human-first security culture<\/a> will help employees stay productive and secure in the hybrid workplace. One factor of this to have a strong password policy. At Microsoft, we see over 10 million username\/password pair attacks every day. Build your strategy on updated password policy guidance from <a href=\"https:\/\/pages.nist.gov\/800-63-3\/sp800-63-3.html\" target=\"_blank\" rel=\"noopener\">NIST<\/a>, <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/passwords\/updating-your-approach\" target=\"_blank\" rel=\"noopener\">NCSC<\/a> and <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/admin\/misc\/password-policy-recommendations?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a>. Using technology such as Windows Hello for Business, the Microsoft Authenticator app and FIDO2 tokens alongside MFA will help to reduce successful credential attacks You can find out more about passwordless tech from Microsoft Security Team member, Alex Weinert in his blog; <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/your-pa-word-doesn-t-matter\/ba-p\/731984\" target=\"_blank\" rel=\"noopener\">Your Pa$$word doesn&#8217;t matter<\/a>.<\/p>\n<p>If passwords are going to be with you for the foreseeable future, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/concept-password-ban-bad-on-premises\" target=\"_blank\" rel=\"noopener\">Azure AD Password Protection<\/a> helps users select passwords that are not commonly known and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/concept-sspr-howitworks\" target=\"_blank\" rel=\"noopener\">Azure AD Self-Service Password<\/a> reset will minimise the operational cost of passwords.<\/p>\n<h2>5.\u00a0 \u00a0 \u00a0 Close the door on insecure legacies<\/h2>\n<p>From our research, we\u2019ve seen most opportunistic attacks target legacy authentication protocols that bypass MFA. But there is an effective control to prevent this. Disabling legacy authentication and enabling MFA is one of the most impactful things you can do to prevent credentials from being compromised. Microsoft provides <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/new-tools-to-block-legacy-authentication-in-your-organization\/ba-p\/1225302\" target=\"_blank\" rel=\"noopener\">the tools<\/a> to you accomplish this. In new Azure tenants, legacy authentication protocols are disabled by default, but many existing tenants still have this enabled.<\/p>\n<h2>Building a secure hybrid workforce<\/h2>\n<p>Multi Factor Authentication is becoming increasing important for an organisation\u2019s cybersecurity. To stay resilient, organisations need to ensure employees can securely and easily access their work across devices, no matter where they are. MFA helps achieve this. Also, by modernising MFA organisations can increase resilience to attacks and service outages. They can also improve agility in adopting new features while supporting legacy systems.<\/p>\n<h2>Find out more<\/h2>\n<p><a href=\"https:\/\/info.microsoft.com\/UK-SCRTY-CNTNT-FY21-11Nov-10-HerestheSecurityRiskManagementebookyourequestedfromMicrosoft-AID-3022957-SRGCM3988_01Registration-ForminBody.html\" target=\"_blank\" rel=\"noopener\">Build a modern security strategy<\/a><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-gb\/business\/reimagine\/security-risk-management\/\" target=\"_blank\" rel=\"noopener\">Security and mobility<\/a><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-gb\/security\/business\/identity-access-management\/mfa-multi-factor-authentication\" target=\"_blank\" rel=\"noopener\">Discover MFA<\/a><\/p>\n<h2>Resources to empower your development team<\/h2>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-gb\/learn\/modules\/secure-aad-users-with-mfa\/\">Secure Azure Active Directory users with Multi Factor Authentication<\/a><\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-gb\/learn\/paths\/manage-identity-and-access\/\">Manage identity and access in Azure Active Directory\u00a0<\/a><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-gb\/security\/business\/identity-access-management\/mfa-multi-factor-authentication\">How Multi Factor Authentication provides secure access to resources<\/a><\/p>\n<h2>About the author<\/h2>\n<p>Gavin works within the Customer Success team at Microsoft. His aim is to make customers more productive, more secure, and ultimately more successful through features like Azure AD. Having seen what modern ransomware attacks can do up close, Gavin is passionate about helping keep an organisation\u2019s customers, staff, systems and data safe. He is also a keen cyclist (on and off road), husband and father to three young children. You can catch him on Twitter <a href=\"https:\/\/twitter.com\/gvnshtn\" target=\"_blank\" rel=\"noopener\">@gvnshtn<\/a> and on <a href=\"https:\/\/www.linkedin.com\/in\/gvnshtn\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we increasingly work outside the office and across different devices, organisations are looking at cloud modernisation and resilient security strategies. To adapt to a complex modern environment, organisations need a strategy that embraces the mobile workforce and empowers productivity, all while protecting people, devices and data no matter where they\u2019re located.<\/p>\n","protected":false},"author":585,"featured_media":50991,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1],"post_tag":[160,1407,804,1565,132,924,199],"content-type":[],"coauthors":[1752],"class_list":["post-50967","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cross-industry","tag-blogger-series","tag-byod","tag-cyber-security","tag-endpoint-security","tag-it-leader","tag-mfa","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How multi-factor authentication empowers secure hybrid working<\/title>\n<meta name=\"description\" content=\"Discover how to use multi-factor authentication to reduce 99.9% of credential attacks in your organisation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How multi-factor authentication empowers secure hybrid working\" \/>\n<meta property=\"og:description\" content=\"Discover how to use multi-factor authentication to reduce 99.9% of credential attacks in your organisation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs - United Kingdom\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-01T07:00:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-07T13:16:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MicrosoftTeams-image-11.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gavin Ashton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gavin Ashton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/author\/gavin-ashton\/\",\"@type\":\"Person\",\"@name\":\"Gavin Ashton\"}],\"headline\":\"How multi-factor authentication empowers secure hybrid working\",\"datePublished\":\"2021-09-01T07:00:49+00:00\",\"dateModified\":\"2021-09-07T13:16:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/\"},\"wordCount\":1530,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MicrosoftTeams-image-11.png\",\"keywords\":[\"Blogger Series\",\"BYOD\",\"Cyber-security\",\"Endpoint Security\",\"IT Leader\",\"MFA\",\"Security\"],\"articleSection\":[\"Cross-industry\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/\",\"name\":\"How multi-factor authentication empowers secure hybrid working\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MicrosoftTeams-image-11.png\",\"datePublished\":\"2021-09-01T07:00:49+00:00\",\"dateModified\":\"2021-09-07T13:16:13+00:00\",\"description\":\"Discover how to use multi-factor authentication to reduce 99.9% of credential attacks in your organisation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MicrosoftTeams-image-11.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MicrosoftTeams-image-11.png\",\"width\":800,\"height\":450,\"caption\":\"Security and flexibility in the hybrid workplace featured image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How multi-factor authentication empowers secure hybrid working\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs - United Kingdom\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs - United Kingdom\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs - United Kingdom\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How multi-factor authentication empowers secure hybrid working","description":"Discover how to use multi-factor authentication to reduce 99.9% of credential attacks in your organisation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/","og_locale":"en_US","og_type":"article","og_title":"How multi-factor authentication empowers secure hybrid working","og_description":"Discover how to use multi-factor authentication to reduce 99.9% of credential attacks in your organisation.","og_url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/","og_site_name":"Microsoft Industry Blogs - United Kingdom","article_published_time":"2021-09-01T07:00:49+00:00","article_modified_time":"2021-09-07T13:16:13+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MicrosoftTeams-image-11.png","type":"image\/png"}],"author":"Gavin Ashton","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gavin Ashton","Est. reading time":"6 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/author\/gavin-ashton\/","@type":"Person","@name":"Gavin Ashton"}],"headline":"How multi-factor authentication empowers secure hybrid working","datePublished":"2021-09-01T07:00:49+00:00","dateModified":"2021-09-07T13:16:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/"},"wordCount":1530,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MicrosoftTeams-image-11.png","keywords":["Blogger Series","BYOD","Cyber-security","Endpoint Security","IT Leader","MFA","Security"],"articleSection":["Cross-industry"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/","name":"How multi-factor authentication empowers secure hybrid working","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MicrosoftTeams-image-11.png","datePublished":"2021-09-01T07:00:49+00:00","dateModified":"2021-09-07T13:16:13+00:00","description":"Discover how to use multi-factor authentication to reduce 99.9% of credential attacks in your organisation.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MicrosoftTeams-image-11.png","contentUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/07\/MicrosoftTeams-image-11.png","width":800,"height":450,"caption":"Security and flexibility in the hybrid workplace featured image"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/01\/how-multi-factor-authentication-empowers-secure-hybrid-working\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"How multi-factor authentication empowers secure hybrid working"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/","name":"Microsoft Industry Blogs - United Kingdom","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization","name":"Microsoft Industry Blogs - United Kingdom","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs - United Kingdom"},"image":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts\/50967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/users\/585"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/comments?post=50967"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts\/50967\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/media\/50991"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/media?parent=50967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/categories?post=50967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=50967"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=50967"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=50967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}