MFA Best Practices
With electronic marketplaces that have online platforms, it is imperative that vendors have their data secure, and their accounts don’t get modified because they’re using insecure logins. We also don’t want their email taken over because of phishing. Therefore, if a user is attempting to log in from an unrecognized device, then they would need to go through additional steps to authenticate their account—not just their username and password, but also additional steps.
We can set this as a default no matter what; it doesn’t have to be only if their device is not recognized based on this fingerprint model. But this is somewhat inconvenient for users to have multi-factor authentication every single login, so we can allow them to select a timeout period, such as a 30, 60, or 90-day period during which they don’t have to login with multifactor authentication. The user can also agree to a waiver that says they understand this increases the risk of a security breach, but for convenience they prefer to do it this way. In addition, we can give users options for how they do multifactor authentication, such as having simpler steps, but more of them.
The main takeaway with multifactor authentication is that just by turning it on it reduces the security risk exponentially. So by orders of magnitude it's reducing the risk of a breach from the most common method of breaching an account, which stems from users not putting in secure passwords. Even if there’s a minimum security requirement, people often use the same or similar passwords in multiple accounts and systems. So if there’s a breach in one system, it can be shared in the dark web, purchased, and then brute force can be used to attempt to log in on all the other sites that the user may be a part of. This is another common hacking method, so a user who has the same password on all these other sites is making themselves vulnerable.
With multi-factor authentication, however, this hacking attempt won’t work because we’ll be able to detect that it’s from a different device than the original user was authenticated with, which would cause the account to need multiple steps to authenticate the person trying to log in. This is an extremely effective method for nullifying hacking attempts.