How to Cook Up a Great MFA Strategy

  Image Source:  Blog

Image Source: Blog

Have you ever attempted to assemble do-it-yourself furniture—or for that matter throw together a meal—without following the instructions or recipes closely? You end up with furniture that looks like it was thrown off a truck or food that’s barely edible.

When it comes to deploying multi-factor authentication (MFA), the same kind of philosophy applies. If you don’t follow some basic guidelines and practices, you’ll end up with a “solution” that doesn’t really solve the problem of protecting data.

Bill Mann of Centrify shares some MFA best practices in this blog post.