Cyber Magazine November 2023 | Page 77

NETWORK & APPLICATIONS
breaches which expose password hashes can be cracked through brute force attacks with modern computing power .
“ It is clear that more secure and efficient methods of authentication are required . An example of this is Multifactor Authentication ( MFA ) as it increases the complexity for attackers , which mitigates many of the weaknesses of standalone passwords or Bio-security which utilises the users fingerprint or face ID ,” explains Williams .
Hackers are becoming more sophisticated Today , hackers have grown increasingly more sophisticated , with the ability to launch attacks from a number of different countries . Employing multiple attack methods , hackers threaten the victim ’ s security strengths , exploiting their vulnerabilities . In these types of attacks , cyber criminals enjoy an unfair advantage and can remain undetected for extended periods of time , often proving impossible to identify . Furthermore , it ’ s usually not a single attacker orchestrating the assault ; but rather a collective effort involving multiple individuals targeting an infrastructure through numerous entry points .

“ While new payment apps and online-only banks offer convenience to customers , they also introduce major vulnerabilities if not properly secured ”

ANDREW DOYLE CEO , NORTHROW cybermagazine . com 77