Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»What is MFA Fatigue?
    Cyber Security Awareness Month Tip

    What is MFA Fatigue?

    By Sofia CoraOctober 11, 20232 Mins Read
    https://help.duo.com/s/article/deployment-signage?language=en_US
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    While the development of multi factor authentication applications like Duo Mobile and Authy have made great strides in protecting our devices, the potential of these apps can give a false sense of security. Hackers have begun relying on a new tactic to bypass these apps and gain access to your account: multi factor authentication fatigue.

    Typically, even if a hacker is able to attain your username and password, they still can’t access your account without duo authentication approval, the owner of the account needs to manually accept every attempt at logging in, especially if the person is in a different location. Fordham University uses Duo Mobile, an MFA that requires account holders to either accept a push notification, pick up a phone call, or retrieve a one time password from a separate device (usually a cellphone) each time they login to Gmail or the portal. After accepting a Duo request, users can select that the device they’re currently using is private, this makes Duo Mobile remember the device and will ask you to request Duo authentication less often. 

    If users aren’t paying attention, they’ll accept Duo push notifications even if they didn’t induce them, giving the hacker access to their full account. Malicious actors can also inundate a user with duo push notifications until the user accepts one just to make it stop.

    MFA fatigue attacks are incredibly dangerous to the security of your account as attackers could access your personal information, send emails from your account name, and even purchase things on your behalf. 

    Most people are overwhelmed with the amount of phone notifications they receive daily, so embracing digital minimalism and only allowing important or time sensitive notifications is the best way to remain mindful of what you click on. Having Duo remember your personal devices can also reduce the amount of requests you get, so when you do get a push notification from Duo, you’re more likely to pay attention.

    Sources: https://duo.com/blog/mfa-fatigue-what-is-it-how-to-respond

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Duo Mobile Multi-Factor Authentication scam
    Previous ArticleHow to Spot & Report a Phishing Email
    Next Article Cybersecurity Is All Of Our Responsibility

    Related Posts

    Stay Ahead of Scammers in 2025

    Incident Response: Why Everyone Needs a Plan for Cyber Threats

    Patches and Software Updates 

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d