MFA- Multi Factor Authentication
This article will help you to understand why Multi Factor Authentication( MFA )became an important architectural component in protecting us in the new Working From Home.
Introduction
In the early days, Cybersecurity (then called IT Security or information security) used to be merely a username and password. If you ask to someone, they would say I have a username and password so I am safe. It wasn’t much of the internet at that time. Eventually, people have learned that password isn’t sufficient to protect their digital assets. So Antivirus (AV) software flourished and we saw a plethora of internet security solutions that revolve around AVs used to catch the known malicious code which was enough of a validation for the vendors. Again, fast forward a couple of years, and the internet became mainstream, and businesses along with consumers started to use the internet for many things and mainly emails and web browsing.
As businesses started using the internet for their emails and web, Firewalls became the solution to our cybersecurity issues. As it was for passwords and AVs.
What have we learned?
True we have a facelift as we learned from attackers where AVs became EDRs, passwords have their own managers and firewalls have Next Generation brand. This is not supposed to be a historical discussion of cybersecurity as we know it. However, 25 years have passed and we are still clung to passwords with cosmetic. The main point is that there is a correlation between going digital and the number of attacks happening.
MFA and COVID19
COVID-19 is a pandemic that opened our eyes to a lot of things, one thing that is within the context of this blog, is that working remotely comes with its own risks and we got to know by doing that password are not enough, and firewalls are not meant to protect us while we are out of office. Also read: The Latest Cyber Threats After the Recent Global Pandemic
That’s why Multifactor Authentication or MFA for short is becoming an important architectural component in protecting us in the new Working From Home (WFH). MFA is becoming what firewalls were in the internet era, the password, and AVs in the 80s.
MFA is not really a new concept, it has been there for a while, however, with the advent of mobile devices, it became mainstream.
Share this article:
Popular

Top 3 Phishing Types and How to Prevent Them in 2025
Phishing Types: Spear Phishing, Smishing & How to Avoid Phishing Emails The Enduring Threat of Phishing Phishing types like spear phishing, smishing, and whaling are becoming more sophisticated in 2025, making it harder than ever to avoid phishing emails. This guide explores the most dangerous phishing types and shows you how to recognize and prevent them before they cause harm. The National Cybersecurity Authority (NCA) reinforces this urgency with its awareness message: ‘Stop for 5 seconds… Guard Your Cyberspace.’ What Is Phishing? Phishing is a cyberattack where malicious actors impersonate trusted entities—like banks, government agencies, or delivery companies—through emails, ...
5th Aug 2025
5 Benefits of Using AI in Cyber security | Artificial Intelligence
Using AI in Cybersecurity We should start learning using AI in cyber security because Hackers aren’t going to slow down any time soon and with a using AI! The next step to level up in protecting your business’s IT infrastructure is to integrate artificial intelligence. Studies have revealed that AI will strengthen the wall between systems and cyber threats. According to an IBM report, the average total cost of a data breach increased in 2021 from $3.86 million to $4.24 million. Cybercriminals are becoming more sophisticated and advanced in their attacks resulting in this significant rise in cost. They are elevating ...
1st Aug 2025
6 benefits of SMS Marketing you should know!
6 benefits of SMS Marketing you should know! Have you ever used SMS marketing to reach and communicate with your audience, if not! I’m sure that you will change your mind when you read about the benefits of SMS Marketing, continue this article to learn.. Many businesses are constantly seeking ways to interact with and attract new customers. Their joint objective is to reach a wider audience. To do so, communication is key. There are many ways for businesses to communicate with their audience, either by email, social media, or adverts, but the most beneficial marketing method, that is often ...
30th Jul 2025
What is the role of MFA? |ECC & SAMA Compliance
ECC & SAMA Compliance with MFA solution Do you know that there are a great MFA solutions in market today help your organization for ECC & SAMA Compliance? this article will show you how and we will provide you the most incredible MFA solution help to comply with Cybersecurity regulation in KSA.. With the world of cyber threats becoming more intense than ever, organizations need to comprehend the need for an improved cybersecurity framework. The universal goal is to protect the organization’s network from any outsider or insider threats, especially with the addition of remote work resulting from the COVID-19 ...
15th Jul 2025
The AI Revolution in Cybersecurity: A New Frontier of Defense
The AI Revolution in Cybersecurity: A New Frontier of Defense The rapid evolution of Artificial Intelligence (AI), especially with the rise of Generative AI (GenAI), is reshaping every industry, and cybersecurity is no exception. As cyber threats grow in complexity and scale, AI is emerging as a powerful ally, offering innovative solutions to protect digital assets and infrastructure. At Cerebra, we explore how AI is reshaping the cybersecurity landscape—from enhancing threat detection to automating response mechanisms—and highlight the critical role it plays in building resilient defenses for a constantly evolving threat landscape. AI-Powered Threat Detection and Prevention Traditional cybersecurity approaches ...
6th Jul 2025
Uber security breach by 18-year-old Hacker!
Uber security breach by 18-year-old Hacker! Uber security breach proves that the largest companies can be hacked by teenagers! this news will undoubtedly shock you.. How Uber security breach happened? Uber recently experienced a cyberattack where an 18-year-old hacker accessed their systems by launching a successful social engineering attack on an employee. The hacker used stolen employee credentials to launch an MFA (Multi-Factor authentication) Fatigue attack. It is an attack where a victim receives multiple requests from their MFA application till it bothers them out leading them to eventually accept the request. The teenage attacker did not disclose how he ...
15th Jun 2025
Biometric Authentication: Is it reliable?
Biometric Authentication The history of bio-metrics used as an authentication tool dates to the 1800s. It was first used by the French to identify criminals through their fingerprints, which later the English police commissioner, Edward Henry, developed HCS “Henry Classification System”. It was a system that relied on fingerprints to identify people who have been prosecuted, it was a prime way of classification used by the police during the 20th century. As the years continued, new biological traits started being used in biometric authentication which in result are replacing traditional methods of authentication. Any invention introduced in the cyber world ...
10th Jun 2025
6 Tips to create a strong password easily!
Create a strong password easily! Today it’s very important to everyone who have an account either on social media or any other websites or services to Create a strong password, because you have to treat your password as your best stuff’s and protect it from others. Learn now the easiest and best tips you have to follow to make a strong password.. What is Password? A password is a string of characters that provides access to a digital system or service. It is a crucial security measure that helps to protect sensitive information from unauthorized access. Passwords can be as simple as a word ...
1st Jun 2025
Juice Jacking: The Threats of Public USB Charging Stations
Juice Jacking and charging in public places Have you ever heard about juice jacking attack? what is it? how it’s happened? and how to protect from it? A shared scenario between many is being in public with a dying mobile device, franticly looking for a charger. When coincidently you find a free charging station calling out your name. You find a solution, but have you ever thought about the risks of using these public charging stations? The accessibility of these public USB charging stations is convenient but connecting your device to one can put you in a vulnerable position. With just plugging in your smartphone or ...
30th May 2025