![]() That number sounds impressive, but it’s not when you consider that nearly two-thirds of accounts with Azure AD admin roles rely on user names and passwords to stop attacker compromise. ![]() ![]() When we chatted after the presentation, Alex clarified that the real number of admin accounts (those holding an Azure AD admin role) protected by MFA is 34.15%. These tenants tend to be smaller, which then means that many large enterprises continue to use unprotected accounts.įigure 3: Some sobering statistics about identity attacksĪs it turns out, there’s a typo on the slide shown in Figure 3. Alex said that roughly 6% is due to Microsoft enforcing MFA on tenant admins through Security Defaults. He noted that over the four-year period from 2018 to today, the percentage of Azure AD accounts protected by MFA grew from a paltry 1.8% to 26.64%. Only 26.64% of Azure AD Accounts Use MFAĭuring his session, Alex kept on returning to the need to secure accounts with multi-factor authentication (MFA). What he had to say has immediate relevance to administrators and anyone associated with securing Azure AD and Microsoft 365. Following Paula Januszkiewicz’s keynote about Revising Cybersecurity Priorities, they listened to Alex Weinert speak on Identity Perimeter and Defenses (Figure 2) Figure 2: Wowing the TEC 2022 crowd with securityĪlex is the Microsoft VP of Identity Security, and his team is responsible for protecting anything to do with identities across Microsoft, including Microsoft 365 and other cloud properties like Xbox and Microsoft’s consumer services. The attendees at the TEC 2022 conference in Atlanta might feel that a conspiracy exists to scare them witless about the vulnerability of IT systems. Figure 1: In-person graphic recording by the Sketch Effect covering the points made by Alex Weinert
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |