WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships 15 Cybersecurity Fundamentals Refresher – #4 Enforce User Access Controls
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

15 Cybersecurity Fundamentals Refresher – #4 Enforce User Access Controls

Author: Jennifer Walker

Created: Tuesday, August 27, 2019 - 16:46

Categories: Cybersecurity, General Security and Resilience

When internet giants Microsoft and Google make bold statistics about stopping greater than 99% of automated attacks by using multifactor authentication (MFA), it is probably a good idea to heed their advice. According to Alex Weinert, Group Program Manager for Identity Security and Protection at Microsoft, based on their studies, accounts are more than 99.9% less likely to be compromised when using MFA. Alex also contends that passwords do not matter anymore, as even the longest, strongest, most complex passwords are stolen through human assisted methods such as phishing emails and keyloggers. Using MFA decreases the risk an adversary could log in with stolen credentials, making MFA an imperative control to protect user accounts. Common MFA methods include biometrics, smart cards, FIDO/CTAP (client to authenticator protocol) enabled hardware devices, or one-time passcodes (OTPs) sent to or generated by previously registered devices. So, what about the 0.1%? The remaining 0.1% account for more sophisticated attacks that use technical solutions for capturing MFA tokens, like Modlishka (covered in the Security & Resilience Update – 10 January 2019, in the post Phishing Attacks that Bypass 2FA Just Got Easier), but these sophisticated attacks are still very rare compared to the constant barrage of credential stuffing botnets and, well, just being human. Read the entire post at ZDNet

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar