Watch our Hands-on Security Walkthrough Session on how to harden your Okta platform. Watch Now

5 Steps to Protect Against MFA Bombing

Best practice when accessing services within the cloud is to use Multi-Factor Authentication (MFA) as a method to authenticate yourself. One of the methods hackers are using to bypass this guardrail is an attack called MFA bombing, manipulate and annoy the target user into approving MFA prompts. In this video, we will review the attack and share how Authomize help organization to detect and respond to the attack.

If you like to secure your organization against identity-based attacks, learn more about our ITDR solution.

Take a deep dive