Hacks That Bypass Multi-Factor Authentication and How to Make Your MFA Solution Phishing Resistant

Date: Tuesday, September 20 at 11am PT / 2pm ET

The average person believes using Multi-Factor Authentication (MFA) makes them significantly less likely to be hacked. That is simply not true! Hackers can bypass 90-95% of MFA solutions much easier than you would think. Using a regular looking phishing email, they can bypass MFA just as easily as if it were a simple password.

Join Roger A. Grimes, KnowBe4’s Data-Driven Defense Evangelist for this new webinar to learn common MFA hacking techniques and what it takes to make your MFA phishing resistant. He’ll also share a pre-filmed MFA hacking demo from Kevin Mitnick, KnowBe4’s Chief Hacking Officer.

In this webinar you’ll learn:

  • Government recommendations for effective MFA
  • Characteristics that make MFA easily hackable
  • Features you should look for in a strong MFA solution
  • Which phish-resistant MFA you should be using
  • Why a strong human firewall is your best, last line of defense

Get the information you need to know now to better defend your network.

Register now!

About the presenter:

Roger A. Grimes, KnowBe4’s Data-Driven Defense Evangelist

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 13 books and over 1,000 magazine articles on computer security. He now serves as the Data-Driven Defense Evangelist for KnowBe4. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He was the weekly security columnist for InfoWorld and CSO magazines from 2005-2019.


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.