The good news is that you don’t have to choose between frustrating your staff and leaving the door open to hackers. Here are some ways to fight MFA fatigue.
Get Smarter With Risk-Based Authentication
Not every login needs MFA. Adapt your process to risk level. Low-risk actions shouldn’t need them, saving your staff the hassle.
Teach Staff How To Identify Suspicious Requests
People are your first line of defense. Teach staff, educators and administrators the value of MFA, how to identify suspicious requests and why K–12 is such a tempting target for cyberattackers.
RELATED: Learn how to build a culture of cybersecurity.
Consider Security Keys or Biometrics
Look into advanced standards, such as Fast IDentity Online 2, or FIDO2, that use security keys or built-in biometrics. These are harder to fake and less annoying for users.
Explore Alternative Notifications
Push notifications are simple to set up but are the easiest to abuse. Explore alternatives, such as one-time codes or hardware tokens.
EXPLORE: Learn why schools need incident response plans today.
Have a Plan for When Cyberattacks Happen
Train staff on how to report attacks related to MFA fatigue. Swift action can drastically limit the damage. And don’t authenticate employees into oblivion. To limit unnecessary ones, adapt the frequency of prompts based on user history.
Offer Clear Explanations To Avoid MFA Fatigue
Give context with MFA requests, such as device or location. A little information helps people make better decisions.
Combatting MFA Fatigue Is Not Just About the Tech
Ultimately, it’s a balancing act. MFA fatigue highlights the fact that good cybersecurity isn’t just technical; it's about making security work with your staff, not against them.