What you need to know
- 99.9 percent of compromised Microsoft accounts don't have multi-factor authentication enabled.
- 1.2 million Microsoft accounts were compromised in January 2020.
- Microsoft emphasized the risks of not using multi-factor authentication at the RSA security conference last week.
Around 1.2 million Microsoft accounts were compromised in just January 2020, and almost all of them could have been secured by enabling a single setting. According to Microsoft engineers, 99.9 percent of the compromised accounts they track do not use multi-factor authentication. Microsoft discussed account security and the risks of not using multi-factor authentication at the RSA security conference last week (via ZDNet).
At the RSA conference, Microsoft pointed out that it tracks more than 30 billion login events every day. On average, 0.5 percent of accounts get hacked, but with over one billion active users, that means that around 1.2 million accounts were compromised in January alone.
Microsoft emphasized the enterprise risk of not having multi-factor authentication enabled. Enterprise users often have sensitive data on their systems. Despite often holding sensitive data, only 11 percent of enterprise users have multi-factor authentication enabled in January 2020, according to Microsoft.
According to Microsoft, the most common form of attack to hack Microsoft accounts is password spraying. This technique takes easy-to-guess passwords and goes through a list of usernames until an attacker can get into the account.
The second most common method of attack is password replay. With this technique, an attacker takes leaked credentials from another company and tries them with a Microsoft account. It relies on people using the same password across multiple accounts. Lee Walker, Identity and Security Architect at Microsoft, says that 60 percent of users reuse passwords. He also adds, "Don't be confused. People reuse their enterprise accounts in non-enterprise environments."
According to Walker, the vast majority of attacks utilizing password spraying and password replay attack older legacy authentication protocols. Specifically, 99 percent of all password spray attacks and 97 percent of password replay attacks go through legacy authentication protocols. This is because these legacy protocols don't support multi-factor authentication, according to Microsoft. Microsoft states that companies that disable legacy authentication protocols see a 67 percent reduction in compromised accounts.
The easiest solution to reduce security risks, according to Microsoft, is to enable multi-factor authentication. Microsoft states that your account is more than 99.9 percent less likely to be compromised if you enable multi-factor authentication.
There's really no excuse not to use multi-factor authentication at this point.
We may earn a commission for purchases using our links. Learn more.
Benchmarking the new Surface Book 3 15 with GTX 1660 Ti and 10th Gen i7
Although it's too early for a review, here are some initial benchmarks from the new Surface Book 3 15-inch with a Core i7 and NVIDIA GeForce 1660 Ti (Max-Q) and how it compares to Surface Book 2 and other premium laptops. Spoiler: While the CPU is just OK, that 1660 Ti definitely bumps up the Book 3's potential.
Review: Sabrent's Rocket Q SSDs are fast, well-priced and go up to 4TB
Sabrent has a new SSD range available in the form of the Rocket Q. These new NVMe SSDs use QLC NAND, but offer impressive speeds and storage capacities at affordable prices. Check our full review to see how they compare against other SSDs.
Review: How do I go back to Wi-Fi 5 after using TP-Link's Archer AX6000?
TP-Link's Archer AX6000 is an 802.11ax router designed to take your network into the future. However, it might not be exactly what you're looking for due to its high-end specs and relatively high price. We explain in this review.
The best photo editing apps for Windows 10
Whether you need to remove red eyes, or do heavy duty editing, these are the best photo editing apps for Windows 10.